Threat Intelligence: The Big Picture

This course provides a solid baseline for cyber threat intelligence. You will learn how to leverage intelligence to understand adversary behavior and make use of indicators of compromise to detect and stop malware.
Course info
Rating
(13)
Level
Beginner
Updated
Aug 3, 2017
Duration
1h 43m
Table of contents
Description
Course info
Rating
(13)
Level
Beginner
Updated
Aug 3, 2017
Duration
1h 43m
Description

Security incidents have become harder to detect, mostly because of the increase in malware complexity and variety. In this course, Threat Intelligence: The Big Picture, you'll learn the foundational knowledge of Cyber Threat Intelligence. First, you'll explore how to classify indicators of compromise using industry standard methodologies. Next, you'll discover how to search for and consume existing intelligence about the threats that you're dealing with. Finally, you'll cover how to maintain the quality of malware detections with a solid set of best practices. When you're finished with this course, you'll have the skills and the knowledge of threat intelligence to implement it into your current incident handline process.

About the author
About the author

Cristian is a Information Security Professional with experience in supply chain, manufacturing, gaming, and entertainment sectors for Fortune 500 companies. He has provided expertise in incident response cases by performing forensic investigations, malware analysis, and elaborating mitigation plans against complex cyber attacks.

More from the author
Threat Hunting with Yara
Intermediate
1h 14m
Jun 25, 2019
Advanced Malware Analysis: Ransomware
Advanced
1h 30m
Jan 24, 2019
More courses by Cristian Pascariu
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello everyone. My name is Cristian Pascariu, and welcome to my course, Threat Intelligence: The Big Picture. I'm an information security professional, and my main goal is for you to start leveraging threat intel to improve threat detection, and gain insight into adversary techniques, tactics, and procedures. This course is built upon the concept of identifying malicious activity by focusing on the common patterns between the events in your environment and events associated with malicious behavior of cyber threats. Some of the major topics that we will cover include threat intelligence methodologies, searching for indicators of compromise, reconstructing the infection chain, sharing standards, and legal requirements. By the end of this course, you'll know the basics of threat intelligence, and how to get the most out of it. Before beginning this course, you should be familiar with basic information security concepts. I hope you'll join me on this journey to learn more about threat intelligence with the Threat Intelligence: The Big Picture course at Pluralsight.