Cyberjumper Pro L2
- 8 hr8 hours
- Login is required!Login is required!
- Customer's Place
Prerequisites : Threat Hunters who are seeking to understand threats more fully and how to learn from them to be able to more effectively hunt threats and counter the tradecraft behind them. Security Operations Center Personnel and Information Security Practitioners who support hunting operations that seek to identify attackers in their network environments. Digital Forensic Analysts and Malware Analysts who want to consolidate and expand their understanding of filesystem forensics, investigations of technically advanced adversaries, incident response tactics, and advanced intrusion investigations. Security Practitioners, should attend. This course is perfect match to any security skill set from red teamers to incident responders. The course is focused on analysis skills. Incident Response Team Members who respond to complex security incidents/intrusions and need to know how to detect, investigate, remediate, and recover from compromised systems across an enterprise. Security experts, who want to master advanced intrusion investigations and incident response, as well as expand their investigative skills beyond traditional host-based digital forensics. Technical Managers who are looking to build intelligence teams or leverage intelligence in their organizations building off of their technical skillsets. You will learn: Carbanak, "The Great Bank Robbery",Understanding Intelligence,Intelligence Lexicon and Definitions,Traditional Intelligence Cycle,Sherman Kent and Intelligence Tradecraft, Structured Analytical Techniques,Understanding Cyber Threat Intelligence,Defining Threats,Understanding Risk,Prerequisites for Intelligence Generation Planning and Direction (Developing Requirements) Intelligence Requirements,Priority Intelligence Requirements, Beginning the Intelligence Lifecycle,Threat Modeling,Cyber Threat Intelligence and Its Role,Expectation of Organizations and Analysts,Four Methods of Threat Detection,Threat Intelligence Consumption,Sliding Scale of Cybersecurity,Consuming Intelligence for Different Goals,Enabling Other Teams with Intelligence,Positioning the Team to Generate Intelligence Building an Intelligence Team,Positioning the Team in the Organization
Please read our policy before anything else! https://www.pheniix.com/impressum For cancellations, please contact us at least 48 hours in advance to avoid being charged. Best regards, Pheniix
Dubai - United Arab Emirates