Don't second guess. Go with experience.

Intro to Structured Analysis

CyberDefenses Academy

$750.00

Available Upon Request - Contact us to request this course, or join the waitlist to be emailed when this product becomes available

[woocommerce_waitlist]

Schedule

Available Upon Request

Location

Available Upon Request

Delivery Method

Classroom & Online

Certification

Certification of Completion

Audience / Level

Intro

Prerequisites

-

Requirements

Laptop required

Course Details

Program Introduction

This course provides an introduction to structured analytical techniques (SATs) and applies those methods to contemporary cases. Students will learn to identify the difference between types of structured analytic method and find which methods are best suited to different circumstances. Students will also learn to recognize the importance of sound analysis and how analytical techniques are applied to different types of cases, especially those in security.

Course Objectives

Coming Soon

Target Student

Coming Soon

Instructor

Monty St John
Monty St John is a computer science and information security expert, U.S. Navy and U.S. Air Force veteran, certified instructor, and author of dozens of classes for CyberDefenses. He has assisted numerous companies build and accredit laboratories, threat teams, and security operations centers. He’s also a prolific writer with two upcoming technical volumes set for 2018; Game Designer and Speaker.Learn more about Monty St John

Additional Information

  • Laptop required
  • Requires basic knowledge of computers, technology and command line interface (CLI)
    • Open and operate browsers
    • Find and use command line
    • Execute scripts
  • Prior threat intelligence experience helpful.
  • Understanding of virtual machines (VM) and how to use one.
    • Understand how to import and power on a VM

Course Outline

  • Introduction
  • Overview
    • SATs History
    • Recognizing Sound Analysis
  • Case Study 1: Current Events
  • Technique Selection
  • 12 Intelligence SATs
    • Diagnostic
    • Contrarian
    • Imaginative Thinking
  • Case Study 2: WannaCry and NotPetya
  • Case Study 3: Breached?
  • Scenarios and Indicators
    • Scenario Tree
  • Case Study 4: Adversary Attack Paths
  • Hypothesis Generation and Testing
    • Idea Generation
  • Wrap-up and Close

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.