FOR578 Cyber Threat Intelligence |
||
Name |
DOWNLOAD
Copy Link
Trouble downloading? see How To |
|
Total Size |
13.5 GB |
|
Total Files |
615 |
|
Last Seen |
2025-08-15 23:37 |
|
Hash |
4A6DF1AB4CDAA4A21B154C925DE8E96AEC389906 |
/PDF 2021/ |
|
|
102.5 MB |
/USB 2021/ |
|
|
10.4 GB |
|
3.1 MB |
/.../1. Introduction to Cyber Threat Intelligence and Requirements/ |
|
|
23.0 MB |
|
3.7 MB |
|
15.6 MB |
|
2.4 MB |
|
11.8 MB |
|
30.8 MB |
|
3.6 MB |
|
4.0 MB |
|
1.9 MB |
|
3.9 MB |
|
7.0 MB |
|
5.8 MB |
|
3.2 MB |
|
3.2 MB |
|
2.6 MB |
/.../1. Cyber Threat Intelligence and Requirements/2. Understanding Intelligence/ |
|
|
199.3 KB |
|
4.1 MB |
|
9.6 MB |
|
1.1 MB |
|
8.5 MB |
|
8.9 MB |
|
5.4 MB |
|
3.1 MB |
|
1.7 MB |
|
12.8 MB |
|
3.7 MB |
|
4.8 MB |
|
3.4 MB |
|
8.6 MB |
|
3.9 MB |
|
2.1 MB |
|
2.5 MB |
18. Kills Chains and Other Structured Models Data into Buckets.mp4 |
6.5 MB |
|
2.3 MB |
|
5.8 MB |
|
12.5 MB |
|
2.1 MB |
|
3.5 MB |
|
863.1 KB |
|
15.5 MB |
|
2.3 MB |
|
4.6 MB |
|
8.5 MB |
|
6.7 MB |
|
4.0 MB |
|
2.4 MB |
/.../3. Understanding Cyber Threat Intelligence/ |
|
|
11.6 MB |
|
2.3 MB |
|
2.1 MB |
|
6.3 MB |
|
10.3 MB |
|
1.9 MB |
|
7.8 MB |
|
3.7 MB |
|
5.6 MB |
|
4.2 MB |
|
4.6 MB |
|
4.6 MB |
|
5.0 MB |
|
2.6 MB |
|
3.3 MB |
|
4.1 MB |
|
1.9 MB |
|
5.8 MB |
|
9.6 MB |
|
1.4 MB |
|
2.9 MB |
|
2.8 MB |
|
417.9 KB |
|
8.9 MB |
/.../4. Threat Intelligence Consumption/ |
|
|
152.6 KB |
|
871.5 KB |
|
4.4 MB |
|
5.7 MB |
|
1.9 MB |
|
4.2 MB |
|
3.5 MB |
|
2.8 MB |
|
4.8 MB |
|
7.6 MB |
|
6.1 MB |
|
1.8 MB |
|
2.1 MB |
|
324.0 KB |
/.../5. Preparing the Team to Generate Intelligence/ |
|
|
1.8 MB |
|
8.4 MB |
|
4.5 MB |
|
2.5 MB |
|
2.0 MB |
|
7.5 MB |
7. A Few Sample Purposes of a Cyber Threat Intelligence Team.mp4 |
1.5 MB |
8. Case Study The First Ever Electric Grid Focused Malware.mp4 |
10.8 MB |
|
4.0 MB |
|
6.1 MB |
|
1.5 MB |
|
1.5 MB |
|
47.0 MB |
|
6.4 MB |
|
1.5 MB |
|
4.0 MB |
|
16.4 MB |
|
3.8 MB |
|
2.2 MB |
|
5.0 MB |
/.../6. Planning and Direction/ |
|
|
2.4 MB |
|
4.2 MB |
|
3.5 MB |
4. A Sample External Collection Management Framework on Malware Data.mp4 |
4.1 MB |
|
5.7 MB |
|
2.3 MB |
|
3.8 MB |
|
2.0 MB |
9. Building a Threat Model Review Your Critical Systems and Information.mp4 |
1.9 MB |
|
4.7 MB |
|
3.3 MB |
|
648.6 KB |
|
3.1 MB |
|
1.5 MB |
|
1.3 MB |
|
1.7 MB |
|
1.5 MB |
|
5.7 MB |
|
5.2 MB |
|
10.1 MB |
|
843.8 KB |
|
5.0 MB |
/.../1. Primary Collection Source Intrusion Analysis/ |
|
|
12.0 MB |
|
1.8 MB |
|
115.3 KB |
|
3.3 MB |
|
48.7 KB |
|
1.4 MB |
|
5.1 MB |
|
1.8 MB |
|
1.8 MB |
|
1.6 MB |
|
2.4 MB |
|
1.9 MB |
|
2.1 MB |
|
1.3 MB |
|
1.0 MB |
|
1.9 MB |
|
1.9 MB |
|
1.5 MB |
|
2.4 MB |
|
1.5 MB |
|
1.3 MB |
|
6.9 MB |
|
1.9 MB |
|
3.9 MB |
|
5.0 MB |
|
1.1 MB |
|
1.6 MB |
|
4.4 MB |
|
3.4 MB |
|
822.4 KB |
|
641.1 KB |
|
1.1 MB |
|
4.8 MB |
|
767.9 KB |
|
800.3 KB |
|
1.0 MB |
|
796.9 KB |
|
688.5 KB |
|
12.3 MB |
|
8.6 MB |
|
2.3 MB |
|
2.2 MB |
|
2.7 MB |
|
278.0 KB |
|
625.2 KB |
|
1.1 MB |
|
8.3 MB |
|
434.1 KB |
|
3.3 MB |
/.../2. Kill Chain and Diamond Deep Dive/ |
|
|
363.3 KB |
|
5.8 MB |
|
1.4 MB |
|
2.8 MB |
|
10.1 MB |
|
2.1 MB |
|
2.5 MB |
|
4.2 MB |
|
1.0 MB |
|
5.8 MB |
|
1.4 MB |
|
2.4 MB |
|
3.9 MB |
|
531.7 KB |
|
1.3 MB |
|
1.1 MB |
|
3.2 MB |
|
635.8 KB |
19. Priority Intelligence Requirements in Exercise Scenario.mp4 |
735.0 KB |
|
3.0 MB |
|
1.3 MB |
|
4.6 MB |
|
1.9 MB |
|
2.9 MB |
|
1.4 MB |
26. Reported Intrusion C2 Victim Pivot 1 FTP Network Traffic.mp4 |
3.0 MB |
27. Reported Intrusion C2 Victim Pivot 2 Flow Data to Known Malicious IPs.mp4 |
3.8 MB |
28. Reported Intrusion Victim Pivot 2 Proxy Search from Flow Data.mp4 |
4.5 MB |
|
1.6 MB |
|
1.2 MB |
|
2.6 MB |
|
1.2 MB |
|
1.5 MB |
|
3.6 MB |
|
868.4 KB |
|
978.7 KB |
|
683.9 KB |
|
2.2 MB |
|
7.3 MB |
|
1.1 MB |
|
1.8 MB |
|
1.7 MB |
|
3.4 MB |
|
1.3 MB |
|
2.0 MB |
|
2.1 MB |
|
1.0 MB |
|
502.9 KB |
|
4.7 MB |
|
1.7 MB |
|
1.2 MB |
|
3.6 MB |
|
1.3 MB |
|
2.0 MB |
|
3.5 MB |
|
690.6 KB |
|
572.0 KB |
|
3.7 MB |
/.../3. Handling Multiple Kill Chains/ |
|
|
241.9 KB |
|
1.5 MB |
|
1.4 MB |
|
2.0 MB |
|
841.2 KB |
|
6.0 MB |
|
1.4 MB |
|
1.1 MB |
|
947.5 KB |
|
1.4 MB |
|
2.0 MB |
|
862.5 KB |
13. Key Indicators and Insights from the Slides Intrusion.mp4 |
5.7 MB |
|
1.2 MB |
|
856.1 KB |
|
3.4 MB |
|
3.1 MB |
18. Key Indicators and Insights from the Exercises Intrusion.mp4 |
6.1 MB |
|
145.8 KB |
|
43.3 KB |
|
82.8 KB |
/.../1. Introduction to Collection Sources/ |
|
|
3.6 MB |
|
104.3 KB |
|
5.6 MB |
|
664.0 KB |
|
5.6 MB |
|
3.9 MB |
|
3.7 MB |
|
4.5 MB |
|
5.6 MB |
/.../2. Collection Source Malware/ |
|
|
1.9 MB |
|
15.6 MB |
|
915.0 KB |
|
5.7 MB |
|
4.1 MB |
|
4.8 MB |
|
3.8 MB |
|
2.5 MB |
|
2.0 MB |
|
1.4 MB |
|
1.7 MB |
|
1.6 MB |
|
3.1 MB |
|
4.1 MB |
|
8.3 MB |
|
4.3 MB |
|
4.0 MB |
18. Compilation of SupplyDenn Intrusion Indicators from Ex 21 and Ex 31.mp4 |
2.5 MB |
19. Recap Indicators and Insights from the Day 2 Slides Intrusion.mp4 |
2.0 MB |
|
3.9 MB |
/.../3. Collection Source Domains/ |
|
|
2.5 MB |
|
1.3 MB |
|
3.2 MB |
|
1.7 MB |
|
1.0 MB |
|
299.3 KB |
|
1.3 MB |
|
1.5 MB |
|
7.8 MB |
|
1.3 MB |
|
584.7 KB |
|
4.4 MB |
|
5.6 MB |
|
7.1 MB |
|
1.5 MB |
|
2.2 MB |
|
2.9 MB |
|
2.0 MB |
|
2.7 MB |
|
2.5 MB |
|
2.6 MB |
|
18.4 MB |
|
569.6 KB |
|
1.4 MB |
|
738.1 KB |
|
764.1 KB |
|
1.5 MB |
28. Exercise 32 Expanding Intelligence Through Partners and OSINT.mp4 |
1.6 MB |
|
2.0 MB |
|
7.3 MB |
|
283.2 KB |
|
2.8 MB |
|
4.7 MB |
|
817.5 KB |
/.../4. Collection Source External Datasets/ |
|
|
3.8 MB |
|
6.7 MB |
|
6.1 MB |
|
13.3 MB |
|
2.4 MB |
|
3.2 MB |
|
2.3 MB |
|
4.4 MB |
|
3.8 MB |
|
4.3 MB |
|
1.2 MB |
|
4.0 MB |
|
4.4 MB |
|
2.3 MB |
|
3.0 MB |
|
184.5 KB |
|
9.1 MB |
|
1.9 MB |
|
524.7 KB |
|
2.6 MB |
|
2.6 MB |
|
2.4 MB |
|
1.2 MB |
|
2.7 MB |
|
1.9 MB |
|
1.7 MB |
|
7.3 MB |
/.../5. Collection Source TLS Certificates/ |
|
|
3.8 MB |
|
4.2 MB |
|
840.6 KB |
|
7.0 MB |
|
834.4 KB |
|
2.1 MB |
|
407.5 KB |
|
1.4 MB |
|
460.1 KB |
|
522.9 KB |
|
1.0 MB |
|
347.6 KB |
|
930.1 KB |
|
1.6 MB |
|
1.8 MB |
|
1.6 MB |
|
2.1 MB |
|
2.1 MB |
|
3.4 MB |
|
2.9 MB |
|
1.2 MB |
|
2.5 MB |
|
579.2 KB |
|
9.4 MB |
|
142.7 KB |
|
2.3 MB |
/.../1. Introduction to Analysis and Production of Intelligence/ |
|
|
5.7 MB |
|
281.0 KB |
|
18.1 MB |
|
12.4 MB |
|
19.2 MB |
|
270.9 KB |
|
6.1 MB |
|
7.3 MB |
|
7.2 MB |
|
2.3 MB |
|
5.2 MB |
/.../2. Exploitation Storing and Structuring Data/ |
|
|
510.8 KB |
|
6.9 MB |
|
19.8 MB |
|
1.5 MB |
|
3.2 MB |
|
1.3 MB |
|
859.5 KB |
|
9.4 MB |
|
3.6 MB |
/.../3. Analysis Logical Fallacies and Cognitive Biases/ |
|
|
4.5 MB |
|
1.9 MB |
|
16.5 MB |
|
12.9 MB |
|
8.3 MB |
|
5.6 MB |
|
30.7 MB |
|
3.7 MB |
|
8.5 MB |
|
3.6 MB |
|
16.6 MB |
|
3.9 MB |
13. Case Study New York Stock Exchange NYSE Computer Glitch.mp4 |
13.7 MB |
|
3.6 MB |
|
10.5 MB |
|
7.4 MB |
|
21.5 MB |
/.../4. Analysis of Competing Hypotheses/ |
|
|
8.2 MB |
|
7.5 MB |
|
4.0 MB |
|
4.4 MB |
|
7.9 MB |
|
2.5 MB |
|
3.3 MB |
|
3.7 MB |
|
3.6 MB |
|
2.7 MB |
|
17.4 MB |
/.../5. Analysis Different Types of Analysis/ |
|
|
798.2 KB |
|
2.9 MB |
|
894.8 KB |
|
1.9 MB |
|
9.0 MB |
|
2.8 MB |
|
2.3 MB |
|
2.5 MB |
|
2.6 MB |
|
710.3 KB |
|
5.6 MB |
|
3.1 MB |
|
2.7 MB |
|
8.1 MB |
|
8.9 MB |
|
4.8 MB |
|
5.0 MB |
/.../6. Analysis Clustering Intrusions/ |
|
|
5.4 MB |
|
11.8 MB |
|
18.1 MB |
|
3.7 MB |
|
3.6 MB |
|
11.4 MB |
|
6.4 MB |
|
20.0 MB |
|
1.4 MB |
|
1.3 MB |
|
691.3 KB |
12. Categorize Evidence Using Kill Chain and the Diamond Model.mp4 |
5.4 MB |
|
1.5 MB |
|
3.7 MB |
|
4.9 MB |
|
21.7 MB |
17. Different Examples of Diamond Models for Different Reqs.mp4 |
4.1 MB |
|
5.2 MB |
|
17.3 MB |
20. Adding Intrusions to the Diamond Model Creating a Group.mp4 |
5.8 MB |
|
2.6 MB |
|
4.4 MB |
|
5.2 MB |
|
5.6 MB |
|
4.1 MB |
26. Recorded Future and Rapid7 Attributed Breaches to APT10.mp4 |
6.1 MB |
27. Group Names are Definitions not Often Publicly Known.mp4 |
8.5 MB |
28. The Problem Isnt just a Recorded Future Rapid7 Problem.mp4 |
5.6 MB |
|
9.0 MB |
|
3.9 MB |
|
3.7 MB |
|
2.3 MB |
|
4.0 MB |
|
2.4 MB |
|
10.2 MB |
|
2.6 MB |
|
789.9 KB |
|
3.5 MB |
|
9.0 MB |
|
143.8 KB |
|
2.7 MB |
/.../1. Introduction to Dissemination and Attribution/ |
|
|
4.0 MB |
|
1.3 MB |
|
6.1 MB |
|
1.0 MB |
|
14.4 MB |
|
1.7 MB |
|
7.7 MB |
|
13.4 MB |
|
4.0 MB |
|
22.7 MB |
/.../5. Dissemination and Attribution/2. Dissemination Tactical/ |
|
|
31.9 KB |
|
14.2 MB |
|
6.0 MB |
|
4.2 MB |
|
712.3 KB |
|
4.7 MB |
|
3.2 MB |
|
3.3 MB |
|
2.7 MB |
|
647.8 KB |
11. Sample YARA Rule Sofacy from the German Parliament Campaign.mp4 |
1.2 MB |
|
232.3 KB |
|
3.8 MB |
|
16.8 MB |
|
8.0 MB |
|
2.3 MB |
|
1.7 MB |
18. HackingTeams Compromise and Mercenary Group Takeaways.mp4 |
7.7 MB |
/.../5. Dissemination and Attribution/3. Dissemination Operational/ |
|
|
34.8 KB |
|
2.1 MB |
|
7.5 MB |
|
984.6 KB |
|
2.9 MB |
|
7.1 MB |
|
2.7 MB |
|
13.0 MB |
|
5.7 MB |
|
2.3 MB |
|
4.5 MB |
|
2.1 MB |
|
1.8 MB |
|
1.4 MB |
|
9.4 MB |
|
1.3 MB |
|
10.6 MB |
|
9.5 MB |
|
4.0 MB |
|
6.0 MB |
|
6.4 MB |
|
2.8 MB |
|
5.8 MB |
|
5.1 MB |
|
2.8 MB |
|
3.2 MB |
/.../5. Dissemination and Attribution/4. Dissemination Strategic/ |
|
|
2.6 MB |
|
7.2 MB |
|
23.8 MB |
|
5.3 MB |
|
6.1 MB |
|
15.9 MB |
|
5.9 MB |
|
2.6 MB |
|
3.5 MB |
|
1.8 MB |
|
2.9 MB |
|
1.7 MB |
|
15.1 MB |
|
1.7 MB |
|
18.9 MB |
|
40.9 KB |
|
4.8 MB |
|
7.3 MB |
|
921.3 KB |
|
49.8 MB |
|
1.0 MB |
|
2.4 MB |
|
2.9 MB |
|
10.8 MB |
|
3.1 MB |
|
7.5 MB |
|
12.5 MB |
|
4.9 MB |
|
5.8 MB |
|
3.5 MB |
|
5.9 MB |
|
3.7 MB |
|
2.0 MB |
/.../5. A Specific Intelligence Requirement Attribution/ |
|
|
7.7 MB |
|
29.0 MB |
|
5.5 MB |
|
14.4 MB |
|
30.1 MB |
6. Achieving the Value of Attribution without Attribution.mp4 |
14.7 MB |
|
9.2 MB |
|
12.2 MB |
|
4.4 MB |
|
6.0 MB |
11. Challenges in Observing the Adversarys Intel Life Cycle.mp4 |
1.6 MB |
|
9.9 MB |
|
5.1 MB |
|
3.1 MB |
|
1.3 MB |
|
5.4 MB |
|
2.8 MB |
|
3.8 MB |
|
9.2 MB |
|
1.3 MB |
|
11.7 MB |
|
7.1 MB |
|
555.1 KB |
24. Operation Troy and Attacks on South Korean Organizations.mp4 |
3.1 MB |
|
7.7 MB |
|
25.2 MB |
|
584.3 KB |
|
401.4 KB |
|
2.1 MB |
|
2.5 MB |
|
2.0 MB |
|
128.9 KB |
|
2.5 MB |
/VoD 2021/6. Capstone/1. Day 6 Capstone/ |
|
|
8.9 MB |
|
3.1 MB |
|
6.1 MB |
|
6.2 MB |
|
2.9 MB |
|
6.2 MB |
|
1.2 MB |
|
2.6 MB |
|
2.2 MB |
|
3.6 MB |
|
7.9 MB |
|
31.2 MB |
|
2.7 MB |
14. Incorporate the Fifteen Axioms for Intelligence Analysts.mp4 |
16.6 MB |
|
80.6 MB |
|
3.6 MB |
Total files 615 |
Copyright © 2025 FileMood.com