We’ve been hit, how can CyberDefenses help? Incident Hotline

Cyber Defenses Academy

Threat Intelligence

Identifying Adversary TTPs

$1,250.00

Product Description

This class introduces students to methods of profiling TTPs observed in open source or through internal collection. A series of interactive labs guide the students in deriving TTPs from observation and analysis. Students then apply models that map logical components to classifications of TTPs to look for gaps or missing pieces to the technique, procedure or tactic profiled. When a student departs this class they will have a practical understanding, confidence and experience to model and profile TTPs observed in internal or external intelligence.

This course is 90% labs and it’s through the use of the interactive labs that the student learns how to identify and profile Tactics, Techniques and Procedures.

Why This Course?

  • It’s designed for those with an interest in using Threat Intelligence tasks to identify elements
    of an adversary’s operations.
  • It conveys the necessary concepts, principles and terms to lay down a solid foundation.
  • It is an introductory class on several tracks CDI offers for the professional starting out.
  • Introduction
  • Profiling
  • Correlation & Analysis
  • Collection
  • Investigation
  • Modeling
  • Wrap-up & Close

Who Should Attend?

  • Individuals new to or desiring a better understanding of how to understand Threat Intelligence concepts.
  • Professionals who deal with technical issues, but feel they do not have enough background in Threat Intelligence.
  • Technical professionals that need to be armed with greater knowledge of incident response, Threat Intelligence and their role in resolving incidents.

Instructor

Monty St John

Monty St John is a computer science and information security expert, U.S. Navy and U.S. Air Force veteran, certified instructor, and author of dozens of classes for CyberDefenses. He has assisted numerous companies build and accredit laboratories, threat teams, and security operations centers. He’s also a prolific writer with two upcoming technical volumes set for 2018; Game Designer and Speaker.

Monty’s investigative background began in the U.S Navy, where he spent the better part of a decade seeking out prisoners-of-war and individuals missing in action. Working to resolve and close decades-old cold cases in foreign lands in another tongue crafted a skillset uniquely suited to Infosec work. To prove it Monty shifted from the U.S. Navy to the U.S. Air Force, switching uniforms and positions, to the Defense Cyber Crime Center (DC3). The work done at DC3 was pioneering in many ways and some of the greatest talent in the industry can trace their history back to DC3.”

What began as a simple meeting of minds with a few friends, has quickly grown into sharing across entire classrooms of new people, with different and keen ideas on how things should be done. Monty has written and teaches a variety of classes and prefers an active learning approach. Monty holds a firm belief that critical thinking underpins everything at some level, but more specifically in Infosec. Every class he crafts sustains this belief and is geared to empowering students to walk away with the ability to sleuth – to outline the problem and then determine the solution. He says. “Once you learn the reason why – the concepts that underpin everything—you will quickly realize that you can take them and apply them to any case, any engagement or issue presented.”

He’s a regular speaker and trainer at industry conferences, including BSides (BSidesCharm, BSidesOK, BSidesKC, Austin BSides, San Antonio BSides, BSidesDFW, BSidesROC), Derbycon, ISSA Summits, OWASP Summits, and ISC2 Summits. He’s also presented security topics to a number of high profile and Fortune 500 executives.

Get to Know Monty St John:

Schedule & Duration

1 day
May 10, Online class

Class Type / Level

App

Prerequisites

Intro to Threat Intelligence

Delivery Method

Classroom
Online

Requirements

Laptop required / additional

Certification

Certification of Completion

What’s Next

Follow up this course with another one of CDI’s offerings:

  • Intro to Threat Intelligence
  • CHRIME for Threat Intelligence
  • Threat Intelligence Fundamentals

Additional Information

  • Laptop required
  • Requires basic knowledge of computers, technology and command line interface (CLI)
    • Open and operate browsers
    • Find and use command line
    • Execute scripts
  • Requires knowledge of Linux
  • Requires basic knowledge of Threat Intelligence
  • Understanding of virtual machines (VM) and how to use one.
    • Understand how to import and power on a VM

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.