News and Public Information Analysis

CyberDefenses Academy

$1,250.00

Schedule

Available Upon Request

Location

Available Upon Request

Delivery Method

Classroom & Online

Certification

Certification of Completion

Audience / Level

App

Prerequisites

Intro to Structured Analysis

Requirements

Laptop required

Course Details

Program Introduction

What we read, hear and intake influences us. The news, be it a journalist, a blogger, a forum or comments on social media ALL affect our thoughts and decision making. It might be unblemished by personal bias or opinion, or the complete opposite. A keen analyst learns to uncover the journalistic techniques that might skew things and read the material objectively.

Public information is the data we let slip away or expose, voluntarily or otherwise. It is out there for all to see. In some cases, you may know about it, and in others you don’t. The connector between these two types of analysis is they are an outward-facing detection. Analysis that dwells on data beyond your perimeter, or “outside the wire”, is not controlled by you, though it influences you.

This course shows students the usefulness of this type of analysis and how it can be employed to understand past and present activities and predict new ones.

Course Objectives

  • It’s designed for those with a background in threat intelligence with a need for greater understanding and practical application of public information analysis.
  • It conveys the necessary concepts, principles and terms to lay down a solid foundation.
  • It is a comprehensive course for those with an interest in analyzing information for potential risk and exposure.

Target Student

Coming Soon

Instructor

Monty St John
Monty St John is a computer science and information security expert, U.S. Navy and U.S. Air Force veteran, certified instructor, and author of dozens of classes for CyberDefenses. He has assisted numerous companies build and accredit laboratories, threat teams, and security operations centers. He’s also a prolific writer with two upcoming technical volumes set for 2018; Game Designer and Speaker. Learn more about Monty St John

Additional Information

  • Laptop required
  • Requires basic knowledge of computers, technology and command line interface (CLI)
    • Open and operate browsers
    • Find and use command line
    • Execute scripts
  • Prior threat intelligence, incident response, infosec, or forensics experience a plus
  • Understanding of virtual machines (VM) and how to use one.
    • Understand how to import and power on a VM

Course Outline

  • Introduction
  • What is news analysis?
  • Deconstruction and analysis
    • Inverted Pyramid
    • Sources of Information
    • Understanding bias
    • Point of view
    • Context and Transparency
    • False Content
  • Why analyze public information?
    • Exposure and risk
    • Risk signals and hints
  • Case Study: VAMPIRE Scans
  • Choosing the right techniques
  • 2x2 model of analysis
    • Reporting versus adding context
    • Analyzing versus providing insight
  • Structured analytic techniques (SATs)
    • What-So What-Now What (W3)
    • Geospatial Analysis
    • Foraging loop
    • What if analysis
    • Decision tree analysis
    • Analytical hierarchy process
  • Case Study: Breach Fatique
  • Wrap-up & Close