Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Profiling the Attacker - Using Offender Profiling in SOC Environments by James Stevenson

Bugcrowd via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a technical offender profiling framework for building a knowledge base on malicious actors in this 19-minute conference talk from LevelUp 0x03. Delve into asset information classification, attack significance plotting, factor comparison analysis, motive discernment, attacker kill chain analysis, malicious actor profile checklists, and naming conventions. Learn how to apply these techniques in Security Operations Center (SOC) environments to better understand and defend against cyber threats. Gain insights into the importance of analyzing not just network packets, but also the attackers themselves, their motivations, and their methods.

Syllabus

Introduction
What is it
Security operations
Asset profiling
Cyberkill chain
Questions
Method 55
Summary

Taught by

Bugcrowd

Reviews

Start your review of Profiling the Attacker - Using Offender Profiling in SOC Environments by James Stevenson

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.