Materi
Kursus:
Panduan Pemahaman Cyber Threat Intelligence
Login
Curriculum
Panduan Pemahaman Cyber Threat Intelligence
Belajar Cyber Threat Intelligence
0/15
1. Solving CTI Sector Incoherence in a Living Growing OpenCTI Repository: Extend STIX 2.1 FTW
22:10
Pratinjau
2. Advanced Cyber Threat Intelligence Chapter - How to Read the Mind of your Attackers
29:38
Pratinjau
3. Tracking Threat Actors Using Images: A Hunting & Analysis Approach
29:38
Pratinjau
4. Automating Cyber Threat Intelligence: A Practical Approach to Managing Emerging Vulnerabilities
Sorry, this lesson is currently locked. You need to complete "3. Tracking Threat Actors Using Images: A Hunting & Analysis Approach" before accessing it.
24:53
5. Decoding Cyber Threats: A Practical Guide to Using Attack Trees
Sorry, this lesson is currently locked. You need to complete "4. Automating Cyber Threat Intelligence: A Practical Approach to Managing Emerging Vulnerabilities" before accessing it.
32;32
6. Blueprint for Maturity: Crafting a Tailored Cyber Threat Intelligence Maturity Model
Sorry, this lesson is currently locked. You need to complete "5. Decoding Cyber Threats: A Practical Guide to Using Attack Trees" before accessing it.
29:37
7. How to Measure Quality os LLMs
Sorry, this lesson is currently locked. You need to complete "6. Blueprint for Maturity: Crafting a Tailored Cyber Threat Intelligence Maturity Model" before accessing it.
27:59
8. Processing Threat Reports at Scale Using AI and ML: Expectations and Reality
Sorry, this lesson is currently locked. You need to complete "7. How to Measure Quality os LLMs" before accessing it.
30:17
9. How to Start Using Priority Intelligence Requirements (PIRs) on a Budget
Sorry, this lesson is currently locked. You need to complete "8. Processing Threat Reports at Scale Using AI and ML: Expectations and Reality" before accessing it.
25:34
10. The Disclosure Dilemma and Ensuring Defense
Sorry, this lesson is currently locked. You need to complete "9. How to Start Using Priority Intelligence Requirements (PIRs) on a Budget" before accessing it.
24:23
11. Enhancing Malware Code Similarity Detection through Vectorsearch and TLSH
Sorry, this lesson is currently locked. You need to complete "10. The Disclosure Dilemma and Ensuring Defense" before accessing it.
25:13
12. Invisible Strings – Contemporary Challenges And Techniques Of Infrastructure Tracking
Sorry, this lesson is currently locked. You need to complete "11. Enhancing Malware Code Similarity Detection through Vectorsearch and TLSH" before accessing it.
29:10
13. Source Pollution Attack - A Hidden Threat in Cybersecurity
Sorry, this lesson is currently locked. You need to complete "12. Invisible Strings – Contemporary Challenges And Techniques Of Infrastructure Tracking" before accessing it.
32:22
14. Sharing Information and Intelligence without Disclosing It - Private Search Set (PSS)
Sorry, this lesson is currently locked. You need to complete "13. Source Pollution Attack - A Hidden Threat in Cybersecurity" before accessing it.
28:01
15. If CSIRTs are Knights, CTI Teams are Queens
Sorry, this lesson is currently locked. You need to complete "14. Sharing Information and Intelligence without Disclosing It - Private Search Set (PSS)" before accessing it.
26:07
Tugas Praktek
0/1
Tugas: Praktik Implementasi Cyber Threat Intelligence
Sorry, this lesson is currently locked. You need to complete "Belajar Cyber Threat Intelligence" before accessing it.
Tugas
Video
1. Solving CTI Sector Incoherence in a Living Growing OpenCTI Repository: Extend STIX 2.1 FTW
Masuk
Kata sandi harus memiliki minimal 8 karakter angka dan huruf, mengandung setidaknya 1 huruf kapital
No Telp
Bidang Keahlian
Bisnis
Marketing
Pemrograman
Pengembangan Website
Bahasa
Design
Sains
Fisika
Kimia
Matematika
Hapus File
Yakin ingin melanjutkan?
Batal
Hapus
I agree with storage and handling of my data by this website.
Privacy Policy
Ingat Saya
Masuk
Daftar
Restore password
Send reset link
Password reset link sent
to your email
Tutup
Your application is sent
We'll send you an email as soon as your application is approved.
Go to Profile
Belum Punya Akun?
Daftar
Masuk
Lupa Password?
WhatsApp Kami