Completed
KEY THREAT INTELLIGENCE FUNCTIONS
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Know the Enemy - How to Make Threat Intelligence Work
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 INTELLIGENCE IS A FEED
- 3 ATTRIBUTION IS A MUST
- 4 NOT ALL THREAT FEEDS CREATED EQUAL
- 5 NOT ALL INDICATORS CREATED EQUAL
- 6 APT 28 (Fancy Bear)
- 7 THE KILL CHAIN IS NOT DEAD
- 8 APT 28 Attack Phases
- 9 STEP 1 - KNOW YOURSELF
- 10 KNOW YOUR ENEMY
- 11 FIND RELEVANT THREATS
- 12 DISSEMINATE
- 13 REQUIREMENTS (EXAMPLES)
- 14 PROCESSING (EXAMPLES)
- 15 ANALYSIS (EXAMPLES)
- 16 DISSEMINATION (EXAMPLE)
- 17 THREAT INTEL PROGRAM MATURITY
- 18 KEY THREAT INTELLIGENCE FUNCTIONS
- 19 ASK YOURSELF