$495

Identifying Adversary TTPs

Event Information

Share this event

Date and Time

Location

Location

CyberDefenses, Inc.

1205 Sam Bass Rd. Suite 300

Round Rock, Tx 78681

View Map

Friends Who Are Going
Event description

Description

Identifying Adversary TTPs

Delivery method: Classroom

Instructor: Monty St John

Requirements: Laptop required | additional

This class introduces students to methods of profiling TTPs observed in open source or through internal collection. A series of interactive labs guide the students in deriving TTPs from observation and analysis. Students then apply models that map logical components to classifications of TTPs to look for gaps or missing pieces to the technique, procedure or tactic profiled. When a student departs this class they will have practical understanding, confidence and experience to model and profile TTPs observed in internal or external intelligence.

This course is 90% labs and its through the use of the interactive labs that the student learns how to identify and profile Tactics, Techniques and Procedures.

Course Outline

Introduction

Profiling

Correlation and Analysis

Collection

Investigation

Modeling

Wrap up and Close

Additional Info:

  • Laptop required
  • Requires basic knowledge of computers, technology and command line interface (CLI)
    • o Assume students can open and operate browsers, find and use the command line, execute scripts and open programs
    • Requires knowledge of Linux
    • Requires basic knowledge of Threat Intelligence
    • Understanding of virtual machines (VM) and how to use one.
      • o Assume students understand how to import and power on a VM

Why this course?

  • The course is designed for those with an interest in using Threat Intelligence tasks to identify elements of an adversary’s operations. It conveys the necessary concepts, principles and terms to lay down a solid foundation. If you have that requirement then it will serve your needs well.
  • The course is an introductory class on several tracks CDI offers for the professional starting out.

Who should attend?

  • Individuals new to or desiring a better understanding of how to understand Threat Intelligence concepts.
  • Professionals who deal with technical issues but feel they do not have enough background in Threat Intelligence
  • Technical professionals that need to be armed with greater knowledge of incident response, Threat Intelligence and their role in resolving incidents.

What’s next?

The following CDI courses are good follow-ups:

  • Intro to Threat Intelligence
  • CHRIME for Threat Intelligence
  • Threat Intelligence Fundamentals
Share with friends

Date and Time

Location

CyberDefenses, Inc.

1205 Sam Bass Rd. Suite 300

Round Rock, Tx 78681

View Map

Save This Event

Event Saved