0
0 Ulasan
Panduan Pemahaman Cyber Threat Intelligence
Pelajari pemahaman mendalam dalam Cyber Threat Intelligence. Daftar Sekarang!
- Deskripsi
- Materi
- Ulasan
Kursus ini dirancang untuk memberikan keterampilan dan wawasan praktis dalam mendeteksi, menganalisis, dan mengatasi ancaman siber dengan metode terkini. Anda akan mempelajari cara membaca pola pikiran penyerang, menggunakan citra untuk melacak aktor ancaman, serta menerapkan otomatisasi pada CTI untuk menghadapi kerentanan baru. Dari penyusunan attack tree hingga pengembangan model maturitas, kursus ini membekali Anda dengan alat dan teknik yang relevan untuk memperkuat ketahanan siber.
Apa yang akan anda pelajari?
- Memahami Inkoherensi Sektor CTI
Di dalam repositori OpenCTI yang berkembang serta cara memperluas STIX 2.1. - Analisis Ancaman Lanjutan
Untuk memahami pola serangan dan pola pikir penyerang. - Pelacakan Aktor Ancaman Menggunakan Citra
Sebagai teknik perburuan dan analisis. - Otomatisasi dalam CTI
Untuk mengelola kerentanan yang muncul secara efisien. - Membangun Attack Tree
Sebagai panduan praktis dalam menganalisis dan memecahkan ancaman siber. - Menyusun Model Maturitas CTI
Yang disesuaikan untuk organisasi, dengan langkah-langkah strategis. - Mengukur Kualitas Model Bahasa Besar (LLMs) dalam mendukung proses CTI.
- Implementasi Priority Intelligence Requirements (PIRs)
Dalam pengumpulan intelijen dengan anggaran terbatas. - Peran CSIRT dan CTI
Dalam lanskap keamanan siber, memahami kerja sama dan peran strategis masing-masing tim.
Belajar Cyber Threat Intelligence
-
11. Solving CTI Sector Incoherence in a Living Growing OpenCTI Repository: Extend STIX 2.1 FTWPratinjau 22:10
-
22. Advanced Cyber Threat Intelligence Chapter - How to Read the Mind of your AttackersPratinjau 29:38
-
33. Tracking Threat Actors Using Images: A Hunting & Analysis ApproachPratinjau 29:38
-
44. Automating Cyber Threat Intelligence: A Practical Approach to Managing Emerging VulnerabilitiesSorry, this lesson is currently locked. You need to complete "3. Tracking Threat Actors Using Images: A Hunting & Analysis Approach" before accessing it.
-
55. Decoding Cyber Threats: A Practical Guide to Using Attack TreesSorry, this lesson is currently locked. You need to complete "4. Automating Cyber Threat Intelligence: A Practical Approach to Managing Emerging Vulnerabilities" before accessing it.
-
66. Blueprint for Maturity: Crafting a Tailored Cyber Threat Intelligence Maturity ModelSorry, this lesson is currently locked. You need to complete "5. Decoding Cyber Threats: A Practical Guide to Using Attack Trees" before accessing it.
-
77. How to Measure Quality os LLMsSorry, this lesson is currently locked. You need to complete "6. Blueprint for Maturity: Crafting a Tailored Cyber Threat Intelligence Maturity Model" before accessing it.
-
88. Processing Threat Reports at Scale Using AI and ML: Expectations and RealitySorry, this lesson is currently locked. You need to complete "7. How to Measure Quality os LLMs" before accessing it.
-
99. How to Start Using Priority Intelligence Requirements (PIRs) on a BudgetSorry, this lesson is currently locked. You need to complete "8. Processing Threat Reports at Scale Using AI and ML: Expectations and Reality" before accessing it.
-
1010. The Disclosure Dilemma and Ensuring DefenseSorry, this lesson is currently locked. You need to complete "9. How to Start Using Priority Intelligence Requirements (PIRs) on a Budget" before accessing it.
-
1111. Enhancing Malware Code Similarity Detection through Vectorsearch and TLSHSorry, this lesson is currently locked. You need to complete "10. The Disclosure Dilemma and Ensuring Defense" before accessing it.
-
1212. Invisible Strings – Contemporary Challenges And Techniques Of Infrastructure TrackingSorry, this lesson is currently locked. You need to complete "11. Enhancing Malware Code Similarity Detection through Vectorsearch and TLSH" before accessing it.
-
1313. Source Pollution Attack - A Hidden Threat in CybersecuritySorry, this lesson is currently locked. You need to complete "12. Invisible Strings – Contemporary Challenges And Techniques Of Infrastructure Tracking" before accessing it.
-
1414. Sharing Information and Intelligence without Disclosing It - Private Search Set (PSS)Sorry, this lesson is currently locked. You need to complete "13. Source Pollution Attack - A Hidden Threat in Cybersecurity" before accessing it.
-
1515. If CSIRTs are Knights, CTI Teams are QueensSorry, this lesson is currently locked. You need to complete "14. Sharing Information and Intelligence without Disclosing It - Private Search Set (PSS)" before accessing it.
Silahkan, login untuk menulis review

×
1. Solving CTI Sector Incoherence in a Living Growing OpenCTI Repository: Extend STIX 2.1 FTW
1. Solving CTI Sector Incoherence in a Living Growing OpenCTI Repository: Extend STIX 2.1 FTW
22:10
2. Advanced Cyber Threat Intelligence Chapter - How to Read the Mind of your Attackers
29:38
3. Tracking Threat Actors Using Images: A Hunting & Analysis Approach
29:38
Bagikan
Detail Kursus
Durasi
6 Jam 49 Menit
Materi
15
Tugas
1
Level
Sedang
Terpopuler
Jam Kerja
Monday | 07.00 WIB - 16.00 WIB |
Tuesday | 08.00 WIB - 15.00 WIB |
Wednesday | 06.00 WIB - 15.00 WIB |
Thursday | 07.00 WIB - 16.00 WIB |
Friday | 08.00 WIB - 15.00 WIB |
Saturday | Closed |
Sunday | Closed |