PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

Threat Intelligence Analysis (CTIA Prep)

Category: Courses / Others
Author: AD-TEAM
Date added: 10.08.2023 :17:54
Views: 6
Comments: 0










Description material

Threat Intelligence Analysis (CTIA Prep)


Threat Intelligence Analysis (CTIA Prep)
Language: English | Size:1.26 GB
Genre:eLearning


Files Included :

01-Course Overview.mp4 (5.36 MB)
MP4
01-Module Intro.mp4 (4.05 MB)
MP4
02-Specific Types of Threats.mp4 (1.47 MB)
MP4
03-What Is Cyber Threat Intelligence.mp4 (2.28 MB)
MP4
04-Importance of Cyber Threat Intelligence.mp4 (1.34 MB)
MP4
05-Malware Is Evolving.mp4 (2.59 MB)
MP4
06-How Does CTIA Certification Fit within Other EC-Council Certifications.mp4 (3.89 MB)
MP4
07-Strategic, Operational, & Tactical Intelligence.mp4 (2.8 MB)
MP4
08-Mitigating the Gaps-Tactical.mp4 (3.56 MB)
MP4
09-Mitigating the Gaps-Operational.mp4 (2.32 MB)
MP4
10-Mitigating the Gaps-Strategic.mp4 (7.63 MB)
MP4
01-Module Intro.mp4 (1.22 MB)
MP4
02-Intelligence as a Differentiator.mp4 (3.3 MB)
MP4
03-Threat Intelligence Classifications.mp4 (2.44 MB)
MP4
04-Gathering & Correlating Information.mp4 (3.45 MB)
MP4
05-Enriching Data & Providing Value.mp4 (3.46 MB)
MP4
06-Intelligence Lifecycle.mp4 (6.24 MB)
MP4
07-Where & How Intelligence Adds Value.mp4 (2.89 MB)
MP4
08-Demo-Threat Intelligence Tool.mp4 (22.71 MB)
MP4
09-Module Review.mp4 (1.62 MB)
MP4
01-Module Intro.mp4 (1.66 MB)
MP4
02-Force Multiplier.mp4 (3.1 MB)
MP4
03-Empowering Executive Decision Making.mp4 (2.6 MB)
MP4
04-Stages of Risk Management.mp4 (5.05 MB)
MP4
05-Risk Management Data Sources.mp4 (4.07 MB)
MP4
06-Mapping out the Plan.mp4 (1.8 MB)
MP4
07-Mitigating the Gaps.mp4 (1.01 MB)
MP4
08-Sharpen Focus.mp4 (3.19 MB)
MP4
09-Filling in the Cybersecurity Skills Gap.mp4 (2.77 MB)
MP4
10-The Roll of Cyberthreat Intelligence.mp4 (2.32 MB)
MP4
01-Module Intro.mp4 (854.66 KB)
MP4
02-Intelligence Lifecycle.mp4 (976.2 KB)
MP4
03-Threat Intelligence Lifecycle.mp4 (2.48 MB)
MP4
04-Cyberthreat Intelligence Frameworks.mp4 (1.99 MB)
MP4
05-The Cyber Kill Chain.mp4 (3.77 MB)
MP4
06-Diamond Model.mp4 (3.17 MB)
MP4
07-MITRE ATT&CK.mp4 (6.58 MB)
MP4
08-NICE Framework.mp4 (7.31 MB)
MP4
09-CREST Framework.mp4 (1.99 MB)
MP4
01-Course Overview.mp4 (3.37 MB)
MP4
01-The Threat Based Approach.mp4 (11.3 MB)
MP4
02-Cyber Threats Overview.mp4 (5.31 MB)
MP4
03-Analyzing Main Threat Vectors.mp4 (23.69 MB)
MP4
04-Analyzing Threat Actors.mp4 (13.93 MB)
MP4
05-Real-World Analysis-Threat Actors.mp4 (6.38 MB)
MP4
06-Understanding Your Enemies.mp4 (14.59 MB)
MP4
01-Threats & IoCs.mp4 (14.63 MB)
MP4
02-Understanding Main Indicators of Compromise.mp4 (16.57 MB)
MP4
03-Indicators of Compromise in the Real World.mp4 (5.71 MB)
MP4
04-Demo-Investigating IoCs of a Ransomware Attack.mp4 (22.99 MB)
MP4
01-Understanding the Kill Chain Methodology.mp4 (4.07 MB)
MP4
02-The Kill Chain Process.mp4 (18.31 MB)
MP4
03-Identifying Common Adversary Behavior.mp4 (13.32 MB)
MP4
04-Fingerprinting an Adversary.mp4 (4.62 MB)
MP4
05-Analyzing Real World Cyber Attacks.mp4 (17.35 MB)
MP4
01-Understanding Highly Skilled Attackers.mp4 (2.7 MB)
MP4
02-APT Objectives & Characteristics.mp4 (12.83 MB)
MP4
03-The APT Lifecycle.mp4 (11.24 MB)
MP4
04-Detecting & Preventing APTs.mp4 (4.22 MB)
MP4
05-Demo-The Mitre ATT&CK Framework.mp4 (30.71 MB)
MP4
06-Analyzing Real World APT Groups.mp4 (9.5 MB)
MP4
07-Course Closure & CTIA Certification Tips.mp4 (6.52 MB)
MP4
1 Course Overview.mp4 (3.11 MB)
MP4
01-The Threat Intelligence Program.mp4 (11.1 MB)
MP4
02-Understanding the Threat Intelligence Approach.mp4 (14.67 MB)
MP4
03-Getting Management Buy-In.mp4 (18.73 MB)
MP4
04-Mapping Threats.mp4 (10.34 MB)
MP4
05-Prioritizing Threats.mp4 (5.55 MB)
MP4
01-Mapping the Ideal Target State.mp4 (6.45 MB)
MP4
02-Defining Threat Intelligence Requirements.mp4 (9.46 MB)
MP4
03-Defining Business Requirements.mp4 (10.7 MB)
MP4
04-Requirement Prioritization.mp4 (9.05 MB)
MP4
05-Defining the Scope of the Threat Intelligence Program.mp4 (9.26 MB)
MP4
01-A Holistic Approach for Threat Intelligence Design.mp4 (7.08 MB)
MP4
02-Setting up the Project Basics.mp4 (15.61 MB)
MP4
03-Designing Data Collection.mp4 (13.78 MB)
MP4
01-The Objectives of a Threat Intelligence Team.mp4 (6.6 MB)
MP4
02-The Team Roles.mp4 (10.84 MB)
MP4
03-The Team Structure.mp4 (12.5 MB)
MP4
04-Preparing & Training the Team.mp4 (10.64 MB)
MP4
01-Designing Data Sharing.mp4 (5.54 MB)
MP4
02-Internal Threat Intelligence Destinations.mp4 (12.68 MB)
MP4
03-External Threat Intelligence Destinations.mp4 (15.44 MB)
MP4
04-Creating Sharing Mechanisms.mp4 (9.98 MB)
MP4
05-Course Closure & CTIA Certification Tips.mp4 (6.89 MB)
MP4
01-Course Overview.mp4 (4.05 MB)
MP4
01-Course Introduction.mp4 (4.41 MB)
MP4
02-Understanding Data Collection Methods.mp4 (10.06 MB)
MP4
03-Understanding Threat Intelligence Collection Management.mp4 (12.89 MB)
MP4
04-Understanding Threat Intelligence Sources.mp4 (20.8 MB)
MP4
01-Collecting Data through Search Engines.mp4 (17.66 MB)
MP4
02-Collecting Data through Web Services.mp4 (12.43 MB)
MP4
03-Collecting Data through Social Media Sites.mp4 (9.87 MB)
MP4
04-Collecting Data through Website Footprinting.mp4 (16.23 MB)
MP4
05-Collecting Data of Public Documents.mp4 (9.15 MB)
MP4
06-Tracking Email Communications.mp4 (3.44 MB)
MP4
01-Using WHOIS Lookup.mp4 (5.53 MB)
MP4
02-Collecting Data using DNS Lookup.mp4 (20.4 MB)
MP4
03-Demonstration-Automating OSINT Collection-Part 01.mp4 (14.5 MB)
MP4
04-Demonstration-Automating OSINT Collection-Part 02.mp4 (27.6 MB)
MP4
05-Demonstration-Automating OSINT Collection-Part 03.mp4 (2.56 MB)
MP4
01-Collecting Data from HUMINT Sources.mp4 (4.73 MB)
MP4
02-Interviewing & Interrogation Techniques.mp4 (5.54 MB)
MP4
03-Using Social Engineering Tools.mp4 (15.38 MB)
MP4
01-Collecting Data Through Cyber Counterintelligence.mp4 (9.2 MB)
MP4
02-Understanding Indicators of Compromise.mp4 (9.29 MB)
MP4
03-Analyzing Malware for Data Collection.mp4 (12.94 MB)
MP4
04-Demonstration-Malware Analysis Tools.mp4 (13.28 MB)
MP4
01-Understanding Bulk Data Collection.mp4 (7.22 MB)
MP4
02-Understanding Data Processing & Exploitation.mp4 (10.77 MB)
MP4
01-Domain Summary.mp4 (11.47 MB)
MP4
01-Course Overview.mp4 (3.57 MB)
MP4
01-Course Introduction.mp4 (4.58 MB)
MP4
02-Introduction to Data Analysis.mp4 (7.16 MB)
MP4
03-Contextualization of Data.mp4 (4.66 MB)
MP4
01-Understanding Data Analysis Techniques.mp4 (6.53 MB)
MP4
02-Understanding Statistical Data Analysis.mp4 (9.37 MB)
MP4
03-Understanding Analysis of Competing Hypotheses.mp4 (8.8 MB)
MP4
01-Understanding Threat Analysis.mp4 (9.8 MB)
MP4
02-Understanding the Threat Analysis Process.mp4 (7.09 MB)
MP4
03-Cyber Kill Chain Methodology-Threat Analysis.mp4 (11.95 MB)
MP4
01-Understanding Threat Modeling.mp4 (13.11 MB)
MP4
02-Understanding Threat Modeling Methodologies.mp4 (11.94 MB)
MP4
03-Demonstration-Using Microsoft Threat Modeling Tool.mp4 (16.03 MB)
MP4
01-Understanding Fine-Tuning Threat Analysis.mp4 (5.73 MB)
MP4
02-Performing Fine-Tuning Threat Analysis.mp4 (17.34 MB)
MP4
03-Automating Threat Analysis Processes.mp4 (10.18 MB)
MP4
04-Understanding Threat Intelligence Evaluation.mp4 (8.42 MB)
MP4
01-Understanding & Developing Runbooks.mp4 (6.97 MB)
MP4
02-Creating a Threat Knowledge Base.mp4 (6.85 MB)
MP4
01-Domain Summary.mp4 (14.51 MB)
MP4
01-Course Trailer.mp4 (4.03 MB)
MP4
01-Course Introduction.mp4 (6.43 MB)
MP4
02-Understanding Threat Intelligence Reports.mp4 (6.87 MB)
MP4
03-Generating Concise Reports.mp4 (13.55 MB)
MP4
04-Maximizing Returns from Threat Intelligence Reports.mp4 (8.99 MB)
MP4
05-Understanding Report Writing Tools.mp4 (5.85 MB)
MP4
01-Disseminating Threat Intelligence.mp4 (9.36 MB)
MP4
02-Building Blocks for TI Sharing.mp4 (7.97 MB)
MP4
03-Sharing TI Information.mp4 (11.12 MB)
MP4
01-Sharing Communities for Threat Intelligence.mp4 (11.34 MB)
MP4
02-Consuming & Responding to Security Alerts.mp4 (7.82 MB)
MP4
03-Sharing External Threat Intelligence.mp4 (6.88 MB)
MP4
01-Sharing Threat Intelligence.mp4 (4.84 MB)
MP4
02-Employing YARA & IT-ISAC.mp4 (6.15 MB)
MP4
03-Intelligence Sharing Acts & Regulations.mp4 (5.05 MB)
MP4
01-Understanding Forms of Delivery.mp4 (6.62 MB)
MP4
02-Standards & Formats for Sharing TI.mp4 (12.4 MB)
MP4
03-Understanding Information & Collaboration Platforms.mp4 (6.48 MB)
MP4
01-Integrating Threat Intelligence.mp4 (5.91 MB)
MP4
02-Acting on Threat Intelligence.mp4 (8.12 MB)
MP4
01-Course Summary.mp4 (12.3 MB)
MP4





Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: