Cyber Intelligence - There Are No Rules and No Certainties
Offered By: YouTube
Course Description
Overview
Explore the intricacies of cyber intelligence in this comprehensive conference talk from Derbycon 2018. Delve into key concepts such as intelligence inference chains, probabilities, and cyber domain frameworks. Learn about various models including the Cyber Kill Chain, Diamond Model, and Miners Attack Framework. Discover techniques for attribution, event analysis, and managing cyber intelligence operations. Gain insights into hypothesis testing and automation in the field. Equip yourself with essential knowledge to navigate the complex landscape of cyber intelligence where rules are fluid and certainties are scarce.
Syllabus
Intro
What is Intelligence
Inference chains
Probabilities
Pop Quiz
Cyber domain
Cyber Intel frameworks
Sticks
Cyber Kill Chain
Diamond Model
Miners Attack Framework
Frameworks
Pyramid of Pain
Getting Started
Attribution
Events
Cyber Attribution
Knowledge Gap
ActionDriven Intelligence
Managing Cyber Intelligence
Hypothesis Testing
Automation
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network