On This Page

Practical Threat Intelligence

Threat Intelligence | August 1-2 & 3-4



Overview

Threat Intelligence is critical to the safety of organizations and most people still don't understand what it is and how to implement it in a practical manner. "Practical Threat Intelligence" will bring you up to speed using a range of hands-on labs to ensure that you walk away with the skills necessary to implement Threat Intelligence into your organization!

To operate within this ever evolving global threat environment, organizations must mature their traditional security strategies to include Intelligence-Based Security, also commonly referred to as Threat Intelligence.

Rather than reacting to alerts for attacks, Intelligence-Based Security enables you to proactively identify threats against your organization and dissolve them before an attack has been launched.

"Practical Threat Intelligence" will develop your hands-on practical skills and knowledge in the following areas:

Intelligence Strategy
  • Threat Intelligence
  • Threat Trending
  • Threat Reports
  • Critical Asset Identification
  • Intelligence Protection Techniques
  • Intelligence Buy-In

Intelligence Aggregation
  • Open Source Intelligence
  • Human Intelligence
  • Counter Intelligence
  • Internal Intelligence
  • Intelligence Data Formats
  • Intelligence Sources
  • Reputation Services
  • Aggregation of Intelligence

Intelligence Capabilities
  • Intelligence Systems
  • Intelligence Architecture
  • Intelligence Services
  • Indicators of Compromise
  • Incident Response (or more accurately Incident Pre-sponse)
  • Automated Response

Threat Analysis
  • Cyber Kill Chain
  • Hacker Profiling
  • Hacker Tracking
  • Big Data Analytics
  • Threat Data Visualization
  • Threat Intent
  • Threat Likelihood
  • Threat Impact

Operational Intelligence
  • Actionable Intelligence
  • Course of Action
  • Automated Proactive Defense
  • Manual Proactive Defense
  • Threat Dissemination
  • Intelligence Sharing
  • Intelligence Strategy, Process and Systems Review

Register now to increase your intelligence!

Who Should Take this Course

  • Security Officers
  • Security Managers
  • Security Auditors
  • System Administrators
  • Penetration Testers
  • Security Developers

Student Requirements

We will teach you everything you need to know.

What Students Should Bring

  • A working laptop (Windows, Mac or Linux) to run a 64-bit VMware VM
  • MINIMUM 2048 MB RAM required.
  • Ethernet network port
  • 20 GB free Hard disk space
  • LATEST version of VMware Player (or Workstation, Server, Fusion, etc.)

What Students Will Be Provided With

  • "Virtual Threat Intelligence Environment"
  • Student Virtual Machine
  • Practical Threat Intelligence workbook
  • Lab instructions and solutions

Trainers

Ian Latter: With more than 20 years in IT and over 15 of those in Security, Ian has worked across the Aerospace, Education, Finance, Government, Health and Telecommunications industries, in a number of multidisciplinary roles from Support to Systems Administration, from Security Officer to Pen-Tester and from Architect to his current Technical Governance Lead role. If he had spare time, Ian would be programming on any of the dozens of hobby software and robotics projects that remain unfinished, including the Barbie Car that he promised his daughter.