Most Advanced Persistent Threat (APT) groups are organized and well-funded. Their main goal is to steal your data. There is much focus on data loss prevention, but how can you truly defend your data unless you know what attackers are specifically after? Hackers are human, they fall victim to doing the minimum they have to do in order to obtain their goal. They typically follow the same game plan until they are forced to change it. The key to defending against these things, is knowing what you have that attackers want and then knowing how they go about getting it.
Threat Intelligence is the art of understanding your enemy to better protect your own network by firmly knowing their tools, techniques and procedures (TTPs).
Implementing blocks of IP addresses, Domain Names and MD5 hash values has very little value. Adversaries can easily change these indicators of compromise, often in an automated manner. The focus then needs to be on identifying groups by the information they are after as well as the tools and procedures they use to find that data.
Threat Intelligence Training in Maryland, Washington D.C. or Northern Virginia
3 Days - 24 Hours
Mon-Wed 8:30am - 5:00pm
Training Course Cost: $ 1,995 Per Enrollment
Coming from out of town? Ask about our hotel accommodation packages!
This is an Advanced Security course. You must meet specific prerequisites in order to enroll in this course. Please speak to your account manager for more details.
Custom Training For Your Organization
If your organization needs something other than what we have listed here, no problem! Just fill out the request information form to the right and tell us more about your training needs, your ideal start-date, your location preference, your unique set of challenges and the expected outcome, and we will develop a customized training course proposal targeted to the specific needs of your staff within your scheduling constraints! We will gladly do this quickly and free of any obligation.
Topics & Concepts Covered in Advanced Threat Intelligence Training Include:
- What is threat intelligence?
- How attackers generally think and act
- Threat landscape
- Intelligence data
- Five of the most successful and widely used analysis techniques
- Understanding how to disseminate collected information
- Cover reporting
This class aims to provide the students with the knowledge they need to begin a threat intelligence program in their own environment. Every environment is different; our goal is to point you in the right direction so that you may hit the ground running.
Recommended Training Audience and Prerequisites
- Cyber Threat Analysts
- Cyber Ops (SOC/CERT)
- Cyber Decision Makers