FileMood

Download FOR578 - Cyber Threat Intelligence

FOR578 Cyber Threat Intelligence

Name

FOR578 - Cyber Threat Intelligence

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

13.5 GB

Total Files

615

Last Seen

2025-08-15 23:37

Hash

4A6DF1AB4CDAA4A21B154C925DE8E96AEC389906

/PDF 2021/

FOR578.pdf

102.5 MB

/USB 2021/

FOR578_SG01_21.2.iso

10.4 GB

Lab_Setup_Instructions_SGFOR578_v02.pdf

3.1 MB

/.../1. Introduction to Cyber Threat Intelligence and Requirements/

1. Welcome to Cyber Threat Intelligence FOR578.mp4

23.0 MB

2. Be Social.mp4

3.7 MB

3. Lab Guidance.mp4

15.6 MB

4. Cyber Threat Intelligence and Requirements.mp4

2.4 MB

5. Course Agenda.mp4

11.8 MB

6. Course Goal A Capable CTI Analyst.mp4

30.8 MB

7. FOR578 GCTI School of Thought.mp4

3.6 MB

8. Section 1 Outline.mp4

4.0 MB

9. Case Study Moonlight Maze.mp4

1.9 MB

10. Targeting Government and Military Networks.mp4

3.9 MB

11. Investigating Moonlight Maze.mp4

7.0 MB

12. 2016 Reanalyzing Moonlight Maze.mp4

5.8 MB

13. Connections to the Present Penquin Turla.mp4

3.2 MB

14. Putting the Pieces Together.mp4

3.2 MB

15. Lessons Learned.mp4

2.6 MB

/.../1. Cyber Threat Intelligence and Requirements/2. Understanding Intelligence/

1. Understanding Intelligence.mp4

199.3 KB

2. Intelligence.mp4

4.1 MB

3. Classic Intelligence Sources.mp4

9.6 MB

4. Counterintelligence.mp4

1.1 MB

5. Case Study Operation Bodyguard.mp4

8.5 MB

6. Sherman Kent.mp4

8.9 MB

7. Kents Analytic Doctrine.mp4

5.4 MB

8. Richards J Heuer Jr.mp4

3.1 MB

9. Analysis.mp4

1.7 MB

10. Analytical Judgment.mp4

12.8 MB

11. DataDriven Versus ConceptuallyDriven Analysis.mp4

3.7 MB

12. Thinking About Thinking and Perception.mp4

4.8 MB

13. Analysis in Action.mp4

3.4 MB

14. Hindrances to Good Analysis.mp4

8.6 MB

15. Bias Example Ransomware Targeting Elections.mp4

3.9 MB

16. System 1 and System 2 Thinking.mp4

2.1 MB

17. Mental Models.mp4

2.5 MB

18. Kills Chains and Other Structured Models Data into Buckets.mp4

6.5 MB

19. Structured Analytic Techniques.mp4

2.3 MB

20. The Intelligence Life Cycle.mp4

5.8 MB

21. Field of View Bias from Collection.mp4

12.5 MB

22. Know the Difference Data Versus Intelligence.mp4

2.1 MB

23. Example Tools for Structured Analytic Techniques.mp4

3.5 MB

24. MindMup.mp4

863.1 KB

25. Exercise 11.mp4

15.5 MB

26. Case Study Operation Aurora 1.mp4

2.3 MB

27. Case Study Operation Aurora 2.mp4

4.6 MB

28. Enter the CyberDragon.mp4

8.5 MB

29. Tools and Tradecraft.mp4

6.7 MB

30. Clues into Attribution.mp4

4.0 MB

31. Lessons Learned.mp4

2.4 MB

/.../3. Understanding Cyber Threat Intelligence/

1. Understanding Cyber Threat Intelligence.mp4

11.6 MB

2. Defining Cyber Threat Intelligence.mp4

2.3 MB

3. CTI Terminology.mp4

2.1 MB

4. Threat.mp4

6.3 MB

5. Intelligence Requirements.mp4

10.3 MB

6. Intrusions.mp4

1.9 MB

7. Activity Group.mp4

7.8 MB

8. Threat Actor.mp4

3.7 MB

9. Campaign.mp4

5.6 MB

10. Traffic Light Protocol.mp4

4.2 MB

11. AdversaryThreat Personas and TargetsVictims.mp4

4.6 MB

12. Tactics Techniques and Procedures.mp4

4.6 MB

13. Tradecraft.mp4

5.0 MB

14. Indicators.mp4

2.6 MB

15. Indicator Life Cycle Introduction.mp4

3.3 MB

16. Key Indicators.mp4

4.1 MB

17. Key Indicator Examples.mp4

1.9 MB

18. Discovery and Indicator Life Span.mp4

5.8 MB

19. Indicator Fatigue and Proper Use Cases.mp4

9.6 MB

20. Case Study PROMETHIUM and NEODYMIUM.mp4

1.4 MB

21. Background.mp4

2.9 MB

22. Observable Characteristics.mp4

2.8 MB

23. NEODYMIUM Intrusion Flow.mp4

417.9 KB

24. The Activity Groups.mp4

8.9 MB

/.../4. Threat Intelligence Consumption/

1. Threat Intelligence Consumption.mp4

152.6 KB

2. Intelligence Generation Versus Consumption.mp4

871.5 KB

3. Sliding Scale of Cyber Security.mp4

4.4 MB

4. Leverage Intelligence to Drive Value.mp4

5.7 MB

5. Offense Intelligence Consumption.mp4

1.9 MB

6. Intelligence Intelligence Consumption.mp4

4.2 MB

7. Active Defense Intelligence Consumption.mp4

3.5 MB

8. Passive Defense Intelligence Consumption.mp4

2.8 MB

9. Architecture Intelligence Consumption.mp4

4.8 MB

10. The Four Types of Threat Detection.mp4

7.6 MB

11. Moving Indicators to Threat Behavioral Analytics.mp4

6.1 MB

12. The Pyramid of Pain.mp4

1.8 MB

13. Exercise 12 LeadIn.mp4

2.1 MB

14. Exercise 12 Optional.mp4

324.0 KB

/.../5. Preparing the Team to Generate Intelligence/

1. Preparing the Team to Generate Intelligence.mp4

1.8 MB

2. Making the Switch from Consuming to Generating.mp4

8.4 MB

3. Priority Intelligence Requirements.mp4

4.5 MB

4. Intended Audience.mp4

2.5 MB

5. Intelligence Requirement Examples.mp4

2.0 MB

6. Structuring Your Team to Generate Intelligence.mp4

7.5 MB

7. A Few Sample Purposes of a Cyber Threat Intelligence Team.mp4

1.5 MB

8. Case Study The First Ever Electric Grid Focused Malware.mp4

10.8 MB

9. Ukraine December 2016.mp4

4.0 MB

10. Exercise 13 The Evolving Situation.mp4

6.1 MB

11. Scenario Companies and Organizations.mp4

1.5 MB

12. Details Roles and Requirements.mp4

1.5 MB

13. Exercise 13.mp4

47.0 MB

14. Case Study Carbanak.mp4

6.4 MB

15. Carberp.mp4

1.5 MB

16. Carbanak.mp4

4.0 MB

17. How the Carbanak Cybergang Stole 1B.mp4

16.4 MB

18. Carbanak Evolution.mp4

3.8 MB

19. The Impact.mp4

2.2 MB

20. Lessons Learned.mp4

5.0 MB

/.../6. Planning and Direction/

1. Planning and Direction.mp4

2.4 MB

2. Generating Intelligence Requirements.mp4

4.2 MB

3. Planning Collection Management Framework.mp4

3.5 MB

4. A Sample External Collection Management Framework on Malware Data.mp4

4.1 MB

5. A Sample Internal Collection Management Framework.mp4

5.7 MB

6. Systems Analysis.mp4

2.3 MB

7. Threat Modeling.mp4

3.8 MB

8. TargetCentric Intelligence Analysis.mp4

2.0 MB

9. Building a Threat Model Review Your Critical Systems and Information.mp4

1.9 MB

10. Adding Potential Adversaries to the Model.mp4

4.7 MB

11. Pivoting off Information and Resources.mp4

3.3 MB

12. Getting the Information You Need.mp4

648.6 KB

13. Go as Granular as You Need.mp4

3.1 MB

14. The VERIS Framework.mp4

1.5 MB

15. Fundamentals of VERIS.mp4

1.3 MB

16. VCAF VERIS Common Attack Framework.mp4

1.7 MB

17. Using VERIS to Track Threats.mp4

1.5 MB

18. Exercise 14 Positioning for the Future 1.mp4

5.7 MB

19. Exercise 14 Positioning for the Future 2.mp4

5.2 MB

20. Exercise 14.mp4

10.1 MB

21. SANS DFIR.mp4

843.8 KB

22. COURSE RESOURCES AND CONTACT INFORMATION.mp4

5.0 MB

/.../1. Primary Collection Source Intrusion Analysis/

1. Welcome to Cyber Threat Intelligence FOR578 Day 2.mp4

12.0 MB

2. The Fundamental Skill Set Intrusion Analysis.mp4

1.8 MB

3. Course Agenda.mp4

115.3 KB

4. Section 2 Outline.mp4

3.3 MB

5. Primary Collection Source Intrusion Analysis.mp4

48.7 KB

6. Kill Chain Overview.mp4

1.4 MB

7. Stage 1 Recon Precursors.mp4

5.1 MB

8. Recon Example.mp4

1.8 MB

9. Stage 2 Weaponization.mp4

1.8 MB

10. Weaponization Example Trojanized Document.mp4

1.6 MB

11. Stage 3 Delivery.mp4

2.4 MB

12. Delivery Example HTTP.mp4

1.9 MB

13. Stage 4 Exploitation.mp4

2.1 MB

14. ExploitDelivery Loop SMTPHTTP.mp4

1.3 MB

15. Stage 5 Installation.mp4

1.0 MB

16. Installation Example.mp4

1.9 MB

17. Stage 6 Command and Control C2.mp4

1.9 MB

18. C2 Example Sleep.mp4

1.5 MB

19. Stage 7 Actions on Objectives.mp4

2.4 MB

20. Actions Example.mp4

1.5 MB

21. Introduction to the Diamond Model.mp4

1.3 MB

22. Diamond Model Axioms.mp4

6.9 MB

23. Diamond Adversary.mp4

1.9 MB

24. Adversary Human Fingerprints Examples in Malware.mp4

3.9 MB

25. Diamond CapabilityTTP.mp4

5.0 MB

26. Diamond Infrastructure.mp4

1.1 MB

27. Diamond Victim.mp4

1.6 MB

28. Merging the Diamond Model and Kill Chain.mp4

4.4 MB

29. One Phases Choices May Move in Another Phase.mp4

3.4 MB

30. CoA Introduction.mp4

822.4 KB

31. The Courses of Action Matrix.mp4

641.1 KB

32. CoA Discover.mp4

1.1 MB

33. CoA Detect.mp4

4.8 MB

34. CoA Deny.mp4

767.9 KB

35. CoA Disrupt.mp4

800.3 KB

36. CoA Degrade.mp4

1.0 MB

37. CoA Deceive.mp4

796.9 KB

38. CoA Destroy.mp4

688.5 KB

39. Action Selection and Mutual Exclusivity.mp4

12.3 MB

40. Leveraging CoA Intel GainLoss.mp4

8.6 MB

41. MITRE ATTCK.mp4

2.3 MB

42. TTPs in ATTCK.mp4

2.2 MB

43. Different Models for Different Use Cases.mp4

2.7 MB

44. Exercise 21 Read In.mp4

278.0 KB

45. Details Roles and Requirements 1.mp4

625.2 KB

46. Details Roles and Requirements 2.mp4

1.1 MB

47. Priority Intelligence Requirements.mp4

8.3 MB

48. Exercise 21.mp4

434.1 KB

49. Exercise 21 Takeaways.mp4

3.3 MB

/.../2. Kill Chain and Diamond Deep Dive/

1. Kill Chain and Diamond Deep Dive.mp4

363.3 KB

2. Log Repositories and logrotate.mp4

5.8 MB

3. Memory Analysis with Volatility.mp4

1.4 MB

4. Section 2 Note Responder Actions.mp4

2.8 MB

5. Incoming Alert What You Have.mp4

10.1 MB

6. First Steps Reported Intrusion.mp4

2.1 MB

7. Responder Action Network Flow Data.mp4

2.5 MB

8. Discovery Findings Network Flow.mp4

4.2 MB

9. Responder Action Proxy Logs.mp4

1.0 MB

10. Discovery Findings Proxy Logs.mp4

5.8 MB

11. Reported Intrusion Where Are We Now.mp4

1.4 MB

12. Exploiting the URL for Tool Discovery.mp4

2.4 MB

13. Pivoting on New Intelligence.mp4

3.9 MB

14. Observing the Indicator Life Cycle.mp4

531.7 KB

15. Reported Intrusion Where Are We Now.mp4

1.3 MB

16. Reported Intrusion Where Do We Go.mp4

1.1 MB

17. Kill Chain Completion.mp4

3.2 MB

18. Exercise 22.mp4

635.8 KB

19. Priority Intelligence Requirements in Exercise Scenario.mp4

735.0 KB

20. Exercise 22 Takeaways.mp4

3.0 MB

21. Phase 7 Actions on Objectives.mp4

1.3 MB

22. Actions on Objectives Network Pivoting Overview.mp4

4.6 MB

23. Actions on Objectives Host Pivoting Overview.mp4

1.9 MB

24. Reported Intrusion C2 Victim Pivot FTP Flow Data.mp4

2.9 MB

25. Responder Action Full Packet Capture.mp4

1.4 MB

26. Reported Intrusion C2 Victim Pivot 1 FTP Network Traffic.mp4

3.0 MB

27. Reported Intrusion C2 Victim Pivot 2 Flow Data to Known Malicious IPs.mp4

3.8 MB

28. Reported Intrusion Victim Pivot 2 Proxy Search from Flow Data.mp4

4.5 MB

29. Reported Intrusion Current Knowledge Gaps 1.mp4

1.6 MB

30. C2 Decoding Overview.mp4

1.2 MB

31. Reported Intrusion Memory Forensics 1.mp4

2.6 MB

32. Reported Intrusion Memory Forensics 2.mp4

1.2 MB

33. Phase 7 Discovery Disk Forensics 1.mp4

1.5 MB

34. Phase 7 Discovery Disk Forensics 2.mp4

3.6 MB

35. Responder Action Reverse Engineering.mp4

868.4 KB

36. Exercise 23.mp4

978.7 KB

37. Priority Intelligence Requirements in Ex 23.mp4

683.9 KB

38. Exercise 23 Takeaways.mp4

2.2 MB

39. Edison Malware Analysis RFI Response.mp4

7.3 MB

40. Capabilities of scvhostexeFJerk.mp4

1.1 MB

41. C2 Protocol for scvhostexeFJerk.mp4

1.8 MB

42. C2 Decoding with CyberChef.mp4

1.7 MB

43. C2 Decoding with Command Line and Scripting.mp4

3.4 MB

44. The Beginning of a Persona.mp4

1.3 MB

45. Exfil Documents.mp4

2.0 MB

46. Where Do We Go.mp4

2.1 MB

47. Reported Intrusion Current Knowledge Gaps 2.mp4

1.0 MB

48. Moving into the System.mp4

502.9 KB

49. Installation Findings.mp4

4.7 MB

50. Responder Action Reverse Engineers RFIs.mp4

1.7 MB

51. Reported Intrusion Current Knowledge.mp4

1.2 MB

52. Phase 4 Exploitation Findings and Problems.mp4

3.6 MB

53. Responder Action User Inbox Archive.mp4

1.3 MB

54. Glancing Forward Phase 3 Findings.mp4

2.0 MB

55. What Happened.mp4

3.5 MB

56. Exercise 24.mp4

690.6 KB

57. Priority Intelligence Requirements in Ex 24.mp4

572.0 KB

58. Exercise 24 Takeaways.mp4

3.7 MB

/.../3. Handling Multiple Kill Chains/

1. Handling Multiple Kill Chains.mp4

241.9 KB

2. Where Are We and Where Do We Go 1.mp4

1.5 MB

3. Reported Intrusion Current Knowledge Gaps.mp4

1.4 MB

4. Reported Intrusion Phase 5 Findings Reprise.mp4

2.0 MB

5. Reported Intrusion Current Knowledge.mp4

841.2 KB

6. InstallationFindings.mp4

6.0 MB

7. Where Are We and Where Do We Go 2.mp4

1.4 MB

8. Phase 3 DeliveryFindings.mp4

1.1 MB

9. The Time Card System.mp4

947.5 KB

10. Reported Intrusion Where Are We and Where Do We Go.mp4

1.4 MB

11. Kill Chain Sequencing.mp4

2.0 MB

12. Visual Representation of Adversarys Efforts.mp4

862.5 KB

13. Key Indicators and Insights from the Slides Intrusion.mp4

5.7 MB

14. Exercise 25.mp4

1.2 MB

15. Some Key Items Collected Out of the Intrusion.mp4

856.1 KB

16. Priority Intelligence Requirements in Ex 25 1.mp4

3.4 MB

17. Priority Intelligence Requirements in Ex 25 2.mp4

3.1 MB

18. Key Indicators and Insights from the Exercises Intrusion.mp4

6.1 MB

19. SANS DFIR.mp4

145.8 KB

20. Here is my lens You know my methods Sherlock Holmes.mp4

43.3 KB

21. COURSE RESOURCES AND CONTACT INFORMATION.mp4

82.8 KB

/.../1. Introduction to Collection Sources/

1. Collection Sources.mp4

3.6 MB

2. Course Agenda.mp4

104.3 KB

3. Section 3 Outline.mp4

5.6 MB

4. Case Study HEXANE.mp4

664.0 KB

5. HEXANE Background.mp4

5.6 MB

6. HEXANE DanBot Header Metadata Compile Times and PDBs.mp4

3.9 MB

7. HEXANE DanBot Header Metadata GUIDs.mp4

3.7 MB

8. HEXANE DanBot Code Reuse.mp4

4.5 MB

9. HEXANE DanBot Configuration Data.mp4

5.6 MB

/.../2. Collection Source Malware/

1. Collection Source Malware.mp4

1.9 MB

2. Collection from Malware.mp4

15.6 MB

3. The Human Fingerprints of Malware.mp4

915.0 KB

4. Header Metadata.mp4

5.7 MB

5. Code Reuse.mp4

4.1 MB

6. Configuration Data.mp4

4.8 MB

7. More Configuration Data Examples.mp4

3.8 MB

8. Where Do You Get Malware.mp4

2.5 MB

9. Commercial Dataset Example VirusTotal.mp4

2.0 MB

10. VirusTotal Results.mp4

1.4 MB

11. VirusTotal Details.mp4

1.7 MB

12. VT Enterprise formerly VirusTotal Intelligence.mp4

1.6 MB

13. DC3 Malware Configuration Parser.mp4

3.1 MB

14. Malware Configuration Data from Dumping Tool.mp4

4.1 MB

15. Exercise 31 Aggregating and Pivoting in Excel.mp4

8.3 MB

16. Exercise 31.mp4

4.3 MB

17. Key Indicators from Exercise 31.mp4

4.0 MB

18. Compilation of SupplyDenn Intrusion Indicators from Ex 21 and Ex 31.mp4

2.5 MB

19. Recap Indicators and Insights from the Day 2 Slides Intrusion.mp4

2.0 MB

20. Combined View Leet.mp4

3.9 MB

/.../3. Collection Source Domains/

1. Collection Source Domains.mp4

2.5 MB

2. Data Pivoting 1.mp4

1.3 MB

3. Data Pivoting 2.mp4

3.2 MB

4. Basic Most Pivotable Indicator Types.mp4

1.7 MB

5. Data Pivoting Example 1.mp4

1.0 MB

6. Data Pivoting Example 2.mp4

299.3 KB

7. Data Pivoting Chart 2.mp4

1.3 MB

8. C2 Domain Registration.mp4

1.5 MB

9. Adversary Registered.mp4

7.8 MB

10. Dynamic DNS Domains.mp4

1.3 MB

11. DDNS Manager.mp4

584.7 KB

12. DDNS for Adversaries.mp4

4.4 MB

13. Legitimate but Compromised.mp4

5.6 MB

14. Case Study Poison Hurricane.mp4

7.1 MB

15. Autonomous System Number ASN Lookups.mp4

1.5 MB

16. ASN Lookup asncymrucom.mp4

2.2 MB

17. Passive DNS 1.mp4

2.9 MB

18. Some PDNS Providers.mp4

2.0 MB

19. Passive DNS 2.mp4

2.7 MB

20. Example Mnemonic PDNS.mp4

2.5 MB

21. Case Study Epic Turlas Out of This World C2.mp4

2.6 MB

22. Epic Tula C2.mp4

18.4 MB

23. For the Next Lab DomainTools.mp4

569.6 KB

24. DomainTools Iris.mp4

1.4 MB

25. DomainTools Search Tabs.mp4

738.1 KB

26. DomainTools Pivot Engine.mp4

764.1 KB

27. DomainTools Identifying New Indicators.mp4

1.5 MB

28. Exercise 32 Expanding Intelligence Through Partners and OSINT.mp4

1.6 MB

29. Exercise 32.mp4

2.0 MB

30. New Intrusion Kirill Lazutin.mp4

7.3 MB

31. Case Study GlassRAT.mp4

283.2 KB

32. Case Study GlassRAT Campaign.mp4

2.8 MB

33. GlassRAT C2 Overlap GlassRAT.mp4

4.7 MB

34. GlassRAT Lessons Learned.mp4

817.5 KB

/.../4. Collection Source External Datasets/

1. Collection Source External Datasets.mp4

3.8 MB

2. OpenSource Intelligence.mp4

6.7 MB

3. Leveraging OSINT.mp4

6.1 MB

4. Threat Data Feeds.mp4

13.3 MB

5. Threat Intelligence Quotient TIQ Test.mp4

2.4 MB

6. Measuring Threat Feeds.mp4

3.2 MB

7. FireHOL IP Lists Threat Feed Analyzer.mp4

2.3 MB

8. Collective Intelligence Framework.mp4

4.4 MB

9. Creating Your Own OSINT Database.mp4

3.8 MB

10. Additional OSINT OpenSource Tools.mp4

4.3 MB

11. AlienVault OTX.mp4

1.2 MB

12. Shodan.mp4

4.0 MB

13. Geographical Information and Maps.mp4

4.4 MB

14. GCHQs CyberChef.mp4

2.3 MB

15. Exercise 33 Introduction.mp4

3.0 MB

16. Exercise 33.mp4

184.5 KB

17. Key Indicators from Exercise 33.mp4

9.1 MB

18. Updated Leet View.mp4

1.9 MB

19. Exercise 34 Leadin Ransomware.mp4

524.7 KB

20. ThirdParty Phone Call.mp4

2.6 MB

21. Priority Intelligence Requirement.mp4

2.6 MB

22. For the Next Lab Recorded FutureHome Page.mp4

2.4 MB

23. For the Next Lab Recorded FutureSearch Menu.mp4

1.2 MB

24. Recorded Future Poison Ivy.mp4

2.7 MB

25. Recorded Future Context.mp4

1.9 MB

26. Exercise 34.mp4

1.7 MB

27. Ex 34 Key Findings.mp4

7.3 MB

/.../5. Collection Source TLS Certificates/

1. Collection Source TLS Certificates.mp4

3.8 MB

2. TLS Certificates.mp4

4.2 MB

3. TLS Certificate Datastores.mp4

840.6 KB

4. TLS Certificate Scan Providers.mp4

7.0 MB

5. Searching Tips.mp4

834.4 KB

6. Censysio Example SANS.mp4

2.1 MB

7. Case Study CVE20141761.mp4

407.5 KB

8. CVE20141761.mp4

1.4 MB

9. Initial Pivoting.mp4

460.1 KB

10. Collecting New Data.mp4

522.9 KB

11. Identifying Links Between Data Points.mp4

1.0 MB

12. Introducing TLS Cert.mp4

347.6 KB

13. Identification of New Data.mp4

930.1 KB

14. Unique Data from New Pivot Type.mp4

1.6 MB

15. Maltego CaseFile.mp4

1.8 MB

16. Maltego Entities and Links.mp4

1.6 MB

17. Adding Entities to the Graph.mp4

2.1 MB

18. Adding Links to the Graph.mp4

2.1 MB

19. MovingManipulating Entities.mp4

3.4 MB

20. Different Views.mp4

2.9 MB

21. Exercise 35.mp4

1.2 MB

22. Recap Indicators from Ex 21 and Ex 35.mp4

2.5 MB

23. RECAP Kirill Lazutin.mp4

579.2 KB

24. Merged View.mp4

9.4 MB

25. SANS DFIR.mp4

142.7 KB

26. COURSE RESOURCES AND CONTACT INFORMATION.mp4

2.3 MB

/.../1. Introduction to Analysis and Production of Intelligence/

1. Analysis and Production of Intelligence.mp4

5.7 MB

2. Course Agenda.mp4

281.0 KB

3. Section 4 Outline.mp4

18.1 MB

4. Case Study Human Operated Ransomware.mp4

12.4 MB

5. Human Operated Ransomware Operations.mp4

19.2 MB

6. Wadhrama Attack Chain by PARINACOTA.mp4

270.9 KB

7. Doppelpaymer Ransomware.mp4

6.1 MB

8. Ryuk from TrickBot Infections.mp4

7.3 MB

9. Make It Easy for Defenders.mp4

7.2 MB

10. Example of Effective Visual Communication of TTPs.mp4

2.3 MB

11. What Evil Looks Like.mp4

5.2 MB

/.../2. Exploitation Storing and Structuring Data/

1. Exploitation Storing and Structuring Data.mp4

510.8 KB

2. Storing Collected Intelligence.mp4

6.9 MB

3. Storing Platforms.mp4

19.8 MB

4. MISP.mp4

1.5 MB

5. Creating an MISP Event.mp4

3.2 MB

6. Visually Linking Indicators Between Events.mp4

1.3 MB

7. Methods of Storing Best Practices.mp4

859.5 KB

8. Leadin to Exercise 41.mp4

9.4 MB

9. Exercise 41.mp4

3.6 MB

/.../3. Analysis Logical Fallacies and Cognitive Biases/

1. Analysis Logical Fallacies and Cognitive Biases.mp4

4.5 MB

2. Identifying and Defeating Bias.mp4

1.9 MB

3. Logical Fallacies.mp4

16.5 MB

4. Common CTI Informal Fallacies.mp4

12.9 MB

5. Other Common Fallacies.mp4

8.3 MB

6. Cognitive Biases.mp4

5.6 MB

7. Mirror Image.mp4

30.7 MB

8. AnchoringFocusing.mp4

3.7 MB

9. Confirmation Bias.mp4

8.5 MB

10. Congruence Bias.mp4

3.6 MB

11. Hindsight Bias.mp4

16.6 MB

12. Illusory Correlation.mp4

3.9 MB

13. Case Study New York Stock Exchange NYSE Computer Glitch.mp4

13.7 MB

14. Cum hoc ergo propter hoc.mp4

3.6 MB

15. Case Study Turkey Pipeline Explosion.mp4

10.5 MB

16. Bias and Experience.mp4

7.4 MB

17. Exercise 42.mp4

21.5 MB

/.../4. Analysis of Competing Hypotheses/

1. Analysis of Competing Hypotheses 1.mp4

8.2 MB

2. Analysis of Competing Hypotheses 2.mp4

7.5 MB

3. 1 Enumerate Hypotheses.mp4

4.0 MB

4. 2 Support the Hypotheses.mp4

4.4 MB

5. 3 Diagnostics.mp4

7.9 MB

6. 4 Refine the Matrix.mp4

2.5 MB

7. 5 Prioritize the Hypotheses.mp4

3.3 MB

8. 6 Determine Evidentiary Dependence.mp4

3.7 MB

9. 7 Report Conclusions.mp4

3.6 MB

10. Identify Milestones.mp4

2.7 MB

11. Exercise 43.mp4

17.4 MB

/.../5. Analysis Different Types of Analysis/

1. Analysis Different Types of Analysis.mp4

798.2 KB

2. Leveraging Different Types of Analysis.mp4

2.9 MB

3. Link Analysis.mp4

894.8 KB

4. Common Link Analysis Tools.mp4

1.9 MB

5. MaltegoCasefile Bubble Chart View.mp4

9.0 MB

6. Data Analysis.mp4

2.8 MB

7. Temporal Data Analysis 1.mp4

2.3 MB

8. Temporal Data Analysis 2.mp4

2.5 MB

9. Trend Analysis.mp4

2.6 MB

10. Case Study Panama Papers.mp4

710.3 KB

11. John Doe.mp4

5.6 MB

12. The Challenge of Data.mp4

3.1 MB

13. Example Link Analysis with Linkurious.mp4

2.7 MB

14. Findings and Aftermath.mp4

8.1 MB

15. CTI Angle IntelligenceDriven Hypothesis Generation.mp4

8.9 MB

16. Exercise 44 Visualizing Large Datasets.mp4

4.8 MB

17. Exercise 44.mp4

5.0 MB

/.../6. Analysis Clustering Intrusions/

1. Analysis Clustering Intrusions.mp4

5.4 MB

2. Style Guide.mp4

11.8 MB

3. NamesIdentifiers.mp4

18.1 MB

4. Risks of Clever Naming Conventions.mp4

3.7 MB

5. MITRE ATTCK Groups Page.mp4

3.6 MB

6. Rosetta Stone APT Groups and Operations Matrix.mp4

11.4 MB

7. There is No OnetoOne Mapping.mp4

6.4 MB

8. OnetoOne Mapping Issues Example.mp4

20.0 MB

9. Confidently Correlating Clusters.mp4

1.4 MB

10. ACH for IntrusionCluster Correlation.mp4

1.3 MB

11. The Basics.mp4

691.3 KB

12. Categorize Evidence Using Kill Chain and the Diamond Model.mp4

5.4 MB

13. Enumerating IntrusionCampaign Hypotheses.mp4

1.5 MB

14. External Intrusion Reports.mp4

3.7 MB

15. Diamond Model Deeper Dive MetaFeatures.mp4

4.9 MB

16. Creating an Activity Group.mp4

21.7 MB

17. Different Examples of Diamond Models for Different Reqs.mp4

4.1 MB

18. Recap of K Lazutin.mp4

5.2 MB

19. New Intrusion Does it Fit.mp4

17.3 MB

20. Adding Intrusions to the Diamond Model Creating a Group.mp4

5.8 MB

21. Introducing PINKIEPIE.mp4

2.6 MB

22. Shortcut The Rule of 2.mp4

4.4 MB

23. Rule of 2 Forming an Activity Group.mp4

5.2 MB

24. When to Retire Clusters.mp4

5.6 MB

25. Case Study APT10 and APT31.mp4

4.1 MB

26. Recorded Future and Rapid7 Attributed Breaches to APT10.mp4

6.1 MB

27. Group Names are Definitions not Often Publicly Known.mp4

8.5 MB

28. The Problem Isnt just a Recorded Future Rapid7 Problem.mp4

5.6 MB

29. Everyones a Little Wrong.mp4

9.0 MB

30. Ex 45 Lead In.mp4

3.9 MB

31. Top Energy Intrusion.mp4

3.7 MB

32. Recap of Top Energys Key Indicators from Day 2.mp4

2.3 MB

33. New Intrusion 1 Key Indicators.mp4

4.0 MB

34. New Intrusion 2 Key Indicators.mp4

2.4 MB

35. Which Intrusion Overlaps.mp4

10.2 MB

36. Introducing RAINBOWDASH Activity Group.mp4

2.6 MB

37. Exercise 45 Leadin.mp4

789.9 KB

38. Recap of Leet Intrusion Set.mp4

3.5 MB

39. Exercise 45.mp4

9.0 MB

40. SANS DFIR.mp4

143.8 KB

41. COURSE RESOURCES AND CONTACT INFORMATION.mp4

2.7 MB

/.../1. Introduction to Dissemination and Attribution/

1. Dissemination and Attribution.mp4

4.0 MB

2. Course Agenda.mp4

1.3 MB

3. Section 5 Outline.mp4

6.1 MB

4. Case Study Axiom.mp4

1.0 MB

5. PlugX.mp4

14.4 MB

6. Hikit Malware.mp4

1.7 MB

7. Hikit Malware and Bit9.mp4

7.7 MB

8. Axiom.mp4

13.4 MB

9. Interesting Attributes.mp4

4.0 MB

10. Lessons Learned.mp4

22.7 MB

/.../5. Dissemination and Attribution/2. Dissemination Tactical/

1. Dissemination Tactical.mp4

31.9 KB

2. Know the Audience.mp4

14.2 MB

3. YARA.mp4

6.0 MB

4. Sample YARA Rule.mp4

4.2 MB

5. YARA Key Points.mp4

712.3 KB

6. Hex Special Values.mp4

4.7 MB

7. More Complex YARA Rules.mp4

3.2 MB

8. Sample YARA Rule Uncommon File Size.mp4

3.3 MB

9. Sample YARA Rule GlassRAT.mp4

2.7 MB

10. Sample YARA Rule Sofacy.mp4

647.8 KB

11. Sample YARA Rule Sofacy from the German Parliament Campaign.mp4

1.2 MB

12. Validating Signatures and IOCs.mp4

232.3 KB

13. Exercise 51.mp4

3.8 MB

14. Case Study HackingTeam.mp4

16.8 MB

15. Case Study HackingTeam 1.mp4

8.0 MB

16. Case Study HackingTeam 2.mp4

2.3 MB

17. HackingTeam Isnt Alone.mp4

1.7 MB

18. HackingTeams Compromise and Mercenary Group Takeaways.mp4

7.7 MB

/.../5. Dissemination and Attribution/3. Dissemination Operational/

1. Dissemination Operational.mp4

34.8 KB

2. Operational Threat Intelligence.mp4

2.1 MB

3. Communicating About Adversary Operations.mp4

7.5 MB

4. Partners and Collaboration.mp4

984.6 KB

5. NationalLevel Government Information.mp4

2.9 MB

6. ISACs and ISAOs.mp4

7.1 MB

7. Additional Resources.mp4

2.7 MB

8. STIXTAXII.mp4

13.0 MB

9. TAXII Implementations.mp4

5.7 MB

10. STIX 21 Objects.mp4

2.3 MB

11. STIX 2.mp4

4.5 MB

12. Methods of Sharing Best Practices.mp4

2.1 MB

13. Exercise 52 Introduction.mp4

1.8 MB

14. Exercise 52.mp4

1.4 MB

15. Woe the Lowly Metric.mp4

9.4 MB

16. Why You Should Embrace Metrics.mp4

1.3 MB

17. Campaign Heatmap.mp4

10.6 MB

18. Organizational Heat Maps.mp4

9.5 MB

19. Incident OneSlider.mp4

4.0 MB

20. Incident OneSlider With Multiple.mp4

6.0 MB

21. Mitigation Scorecard.mp4

6.4 MB

22. Email Delivery Success.mp4

2.8 MB

23. Analytical Completeness.mp4

5.8 MB

24. Case Study Metrics from CTI Summit.mp4

5.1 MB

25. Exercise 53 Gaining Historical Perspective.mp4

2.8 MB

26. Exercise 53.mp4

3.2 MB

/.../5. Dissemination and Attribution/4. Dissemination Strategic/

1. Dissemination Strategic.mp4

2.6 MB

2. Strategic Threat Intelligence.mp4

7.2 MB

3. Example Outcome Indictments.mp4

23.8 MB

4. Making the Business Case for Security.mp4

5.3 MB

5. Expectations.mp4

6.1 MB

6. Lessons from the Field Shoe Company and AntiHype.mp4

15.9 MB

7. ReportsNarrativeForm Intelligence.mp4

5.9 MB

8. Observation Versus Interpretation.mp4

2.6 MB

9. Estimative Language.mp4

3.5 MB

10. Estimative Scales.mp4

1.8 MB

11. ALWAYS REMEMBER.mp4

2.9 MB

12. Diamond Model and Analytic Findings.mp4

1.7 MB

13. Confidence Assessments.mp4

15.1 MB

14. Constructing Assessments.mp4

1.7 MB

15. Tips on Effective Report Writing.mp4

18.9 MB

16. InClass Exercise.mp4

40.9 KB

17. Proofpoints North Korea Bitten by Bitcoin Bug.mp4

4.8 MB

18. Proofpoints North Korea Report Pros and Cons.mp4

7.3 MB

19. Norses Iran CIB.mp4

921.3 KB

20. Iran CIB Pros and Cons.mp4

49.8 MB

21. Kasperskys Equation Group Optional.mp4

1.0 MB

22. Equation Group Pros and Cons Optional.mp4

2.4 MB

23. Case Study APT10 and Cloud Hopper.mp4

2.9 MB

24. APT10 and the Chinese State.mp4

10.8 MB

25. APT10 and the US Government.mp4

3.1 MB

26. Indictments for Attribution APT10.mp4

7.5 MB

27. Indictments for TTP Discovery APT10.mp4

12.5 MB

28. Indictments for IOC Discovery APT10.mp4

4.9 MB

29. Cloud Hopper.mp4

5.8 MB

30. Observations for CTI Analysts Communicating Broadly.mp4

3.5 MB

31. Observations for CTI Analysts Human Fingerprints.mp4

5.9 MB

32. Observations for CTI Analysts Timelines.mp4

3.7 MB

33. Observations for CTI Analysts Closing Thoughts.mp4

2.0 MB

/.../5. A Specific Intelligence Requirement Attribution/

1. A Specific Intelligence Requirement Attribution.mp4

7.7 MB

2. Attribution as an Intelligence Requirement.mp4

29.0 MB

3. On Attribution.mp4

5.5 MB

4. Four Approaches to True Attribution.mp4

14.4 MB

5. The Simpsons Did It.mp4

30.1 MB

6. Achieving the Value of Attribution without Attribution.mp4

14.7 MB

7. Example Use Cases of Attribution.mp4

9.2 MB

8. Attribution Is Never Straightforward.mp4

12.2 MB

9. Example Merged State and Criminal Activity.mp4

4.4 MB

10. Geopolitical Conflict Intersects Cyber.mp4

6.0 MB

11. Challenges in Observing the Adversarys Intel Life Cycle.mp4

1.6 MB

12. Deriving Intent.mp4

9.9 MB

13. The Basics of State Attribution.mp4

5.1 MB

14. Analytical Model for Each Entity.mp4

3.1 MB

15. Categorize Evidence Using Threat Definition.mp4

1.3 MB

16. Understanding Opportunity.mp4

5.4 MB

17. ACH Matrix Template for State Attribution.mp4

2.8 MB

18. Be Prepared for Information to Change.mp4

3.8 MB

19. CaseStudy Soviet Disinformation Operations.mp4

9.2 MB

20. False Flags.mp4

1.3 MB

21. False Flag Example South Korean Winter Olympics.mp4

11.7 MB

22. Coming to the EndReassess Intelligence Requirements.mp4

7.1 MB

23. Case Study Lazarus Group.mp4

555.1 KB

24. Operation Troy and Attacks on South Korean Organizations.mp4

3.1 MB

25. The Sony Attack.mp4

7.7 MB

26. Government Attribution.mp4

25.2 MB

27. WannaCry Connections.mp4

584.3 KB

28. Overlaps in the Intrusions.mp4

401.4 KB

29. The Making of a Group Lazarus.mp4

2.1 MB

30. Problem with Extending Too Far.mp4

2.5 MB

31. Exercise 54.mp4

2.0 MB

32. SANS DFIR.mp4

128.9 KB

33. COURSE RESOURCES AND CONTACT INFORMATION.mp4

2.5 MB

/VoD 2021/6. Capstone/1. Day 6 Capstone/

1. Day 6 Capstone.mp4

8.9 MB

2. Capstone The Goals.mp4

3.1 MB

3. Capstone What to Know To Have Fun.mp4

6.1 MB

4. Capstone How to Win.mp4

6.2 MB

5. Scenario Background.mp4

2.9 MB

6. VI Capstone.mp4

6.2 MB

7. You.mp4

1.2 MB

8. The State Actors.mp4

2.6 MB

9. The NonState Actors.mp4

2.2 MB

10. Scenario Objectives.mp4

3.6 MB

11. Your Resources.mp4

7.9 MB

12. Capstone.mp4

31.2 MB

13. Baby Yoda.mp4

2.7 MB

14. Incorporate the Fifteen Axioms for Intelligence Analysts.mp4

16.6 MB

15. Thanks for Coming.mp4

80.6 MB

16. SANS DFIR.mp4

3.6 MB

 

Total files 615


Copyright © 2025 FileMood.com