Overview
In an era of escalating cyber threats, having a robust threat intelligence (TI) capability is essential for any organization. This course provides a comprehensive deep dive into the core TI models and frameworks—such as the MITRE ATT&CK framework, the Diamond Model, and the Cyber Kill Chain—and demonstrates how to apply them effectively to map Advanced Persistent Threats (APTs). Participants will learn how to collect, analyze, and operationalize threat data, leveraging techniques for identifying Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs).
A key focus of the training is hands-on experience with OpenCTI, an open-source platform for consolidating and sharing threat intelligence. Through practical exercises and real-world use cases.
What will you Learn?
Introduction to Threat Intelligence
- Definition, Importance, and Components of Threat Intelligence
- Tactical, Operational, and Strategic Threat Intelligence
- Importance of Threat Intelligence in Cybersecurity
- Threat Intelligence Life Cycle
Threat Intelligence Framework
- Cyber Kill Chain
- MITRE ATT&CK Framework
- Diamond Model
- Building a Threat Program
OpenCTI Platform Overview
- What is OpenCTI
- Key Modules and Functionality
- Connecting External Threat Intelligence Sources
OpenCTI Platform Overview
- What is OpenCTI?
- Key Modules nd
- Memory Forensics
- Hunting with Powershell
- Baselines
- Hunting with Web Shells
- Powershell Hunting Tools
- Important Windows Events
- Hunting with Splunk
- Hunting with OS Query
Why Do You Need This Course?
- This course enables you to acquire the hunting mindset that’ll make you a skilled professional who can identify and mitigate threats.
- Cyber threats are constantly evolving, and organizations must be proactive in identifying and responding to them. This course can provide individuals with the knowledge and skills needed to detect various threats.
- This course can help individuals and organizations enhance their cybersecurity posture by providing them with the tools and techniques needed to identify, analyze, and respond to threats.
- CyberTalents threat hunting course will qualify individuals to work as professional threat hunters and make them an essential component of any organization's cybersecurity strategy.