YoVDO

Passive Intelligence Gathering Analytics

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Data Analysis Courses Cybersecurity Courses Threat Intelligence Courses

Course Description

Overview

Explore passive intelligence gathering analytics in this 52-minute conference talk from WEareTROOPERS. Delve into threat identification, open-source intelligence gathering techniques, and data analysis methods. Learn about the design goals and usage of Just-Metadata, a tool for IP analysis and geo-information collection. Discover how to effectively analyze gathered data, develop analysis modules, and apply these techniques in real-world scenarios. Gain insights into the challenges of threat intelligence and explore future developments in the field of passive intelligence gathering.

Syllabus

Intro
Who Are Our Threats?
First Steps
Passive Intelligence Gathering
Threat Intelligence is..
Threat Intel Issues
Open Source Intelligence Gathering
Analyzing Data
Just-Metadata Design Goals
Just-Metadata Usage Goals
Loading IPs
Usability Point
Intel Gathering Reminder!
Geo Info
Goal of Analysis Modules
Module Development
Use Cases
Future Work


Taught by

WEareTROOPERS

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network