最新消息:需要购买可以去xiaocaib.taobao.com网店购买会员 注册登录即可屏蔽广告

Operationalizing Cyber Threat Intel: Pivoting & Hunting

教程/Tutorials dsgsd 169浏览 0评论



MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | + Exercise Files
Level: Intermediate | Released: 22 Oct 2018
Duration: 2h 34m | 388 MB

The prevalence of Cyber Threat Intelligence (CTI) continues to grow within the incident response industry. This course teaches you how to extract, ingest, pivot on, and hunt for indicators from CTI to help you find what your security tools can’t.

Cyber Threat Intelligence (CTI) is all around us. You can generate intel yourself, pull indicators from a feed, subscribe to a commercial service, or simply extract intel from social media. However, what do you do with the intel once you obtain it? Many companies simply block atomic indicators within their firewalls and move on with life, but there’s so much more to it than that! In this course, Operationalizing Cyber Threat Intel: Pivoting & Hunting, you’ll explore how to ingest CTI properly. First, you’ll learn to make the most of intel articles by extracting all the indicators they provide, even those that aren’t obvious. Next, you’ll discover how to pivot on your extracted indicators to provide a more holistic view of the threat. Finally, you’ll touch on some techniques you can use to hunt for indicators within your network. After taking this course, you’ll be better equipped to help protect your organization from threats by reviewing CTI sources and ingesting the information using a skilled, dynamic analysis method.

Password/解压密码-0daydown

Download rapidgator
https://rg.to/file/1ece8c70ab651f720af9dd33629a75ad/pls_Operationalizing_Cyber_Threat_Intel_-_Pivoting_Hunting.rar.html

Download nitroflare
http://nitroflare.com/view/3777BEE09A82B62/pls_Operationalizing_Cyber_Threat_Intel_-_Pivoting_Hunting.rar

Download 百度云

你是VIP 1个月(1 month)赞助会员,

资源下载此资源仅限VIP下载,请先

转载请注明:0daytown » Operationalizing Cyber Threat Intel: Pivoting & Hunting

您必须 登录 才能发表评论!