As a cyber threat intelligence analyst, you must understand the main threats and how attackers do their work. By understanding the hacker mindset and the procedures that malicious attackers use, you will be able to better protect your company.
In this course, Threat Intelligence: Cyber Threats and Kill Chain Methodology, you’ll learn about the main cybersecurity threat vectors/actors as well as how the attackers perform their work.
First, you’ll explore the main cyber security threats, including a deep dive into the most current threat vectors and threat actors. Next, you’ll discover the main indicators of compromise, so then you can easily spot early signs of intrusion in your organization. Finally, you’ll learn about Advanced Persistent Threats (APT) groups as well as the kill chain methodology that they use. When you’re finished with this course, you’ll have the skills and knowledge of the main threat vectors and threat actors needed to better protect your company.
This course covers the second chapter of the Cyber Threat Intelligence Analyst (C|TIA or CTIA) Certification.
Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Course Overview Hi everyone, my name is Ricardo, and welcome to my course, Threat Intelligence: Cyber Threats and the Kill Chain Methodology. I'm a cybersecurity specialist with years experiencing threat intelligence and offensive cybersecurity. Understanding the main threats and how attackers do their work is essential for a threat intelligence specialist. It is only when you understand your enemies that you can actually prepare yourself for the attacks. In this course, we're going to analyze the main cyber threats and the kill chain methodology, which is how the attackers do their job. In here, we cover a few important topics, such as the main threat vectors, such as phishing emails and password attacks; the main threat actors, such as hacktivists and state‑sponsored hacking groups; the main indicators of compromise, which will help you to detect threats in your company; the kill chain methodology, which is the way that hackers do their attacks; and the advanced persistent threats, or APTs, which are really advanced groups of hackers, or in other words, the nightmare of any cybersecurity professional. If you're planning to take the Cyber Threat Intelligence Analyst certification, you're in the right place. In here, we cover the second chapter of the CTIA certification, as well as some additional topics that are essential for a threat intelligence specialist. By the end of this course, you'll be familiar with the main cyber threats and how hackers do their work, so then you can be prepared for such threats. So, I hope you join me in this journey to learn about threat intelligence with the Cyber Threats and Kill Chain Methodology course, here at Pluralsight.