Cyber Threat Intelligence Analysis

This five-day, instructor-led cyber threat intelligence training course teaches network defenders to collect, analyze, and apply targeted cyber intelligence to defensive operations. The instruction provided enables students to proactively act on and adapt to sophisticated attacks by cyber adversaries. The limited signature and heuristic analysis capabilities of antivirus software and intrusion detection and prevention systems (IDS/IPS) causes them to become less effective as counter-detection tools as malicious software improves. Whitelisting and sandboxing technologies mitigate many host-based attacks, but that alone is not enough. To identify and prioritize threats to the network, defenders require additional methodologies of analysis and attribution of advanced persistent threat actors.

This course applies the intelligence cycle to full-spectrum exercise of proactive network defense. It is intended as the core competency of threat intelligence operations and as the precursor to additional technical intelligence collection courses. It provides students with the all-source methodology of employing cyber collection sources and disciplines in a cumulative effort to apply to network defensive postures. When properly employed, this process fosters an environment of preemptive action. Network defenders and operators are equipped with the tools, techniques, and procedures to generate timely, relevant, and actionable intelligence.

The principle objective of Cyber Threat Intelligence Analysis training is to equip students with a modern methodology for characterizing, investigating, attributing, and responding to advanced cyber threats. Network defenders, intelligence analysts, and other security operations personnel acquire the tools to work in a collaborative, real-time environment. Students should expect to leave this course with proficiency in intelligence-driven network defense operations.

Instructors teach the intelligence-driven operations cycle – data collection, exploitation, analysis, reporting, and dissemination – to develop the student’s methods of identifying threats and assessing and prioritizing risk. Students are introduced to cyber intelligence sourcing, risk management and assessment, indicators of compromise, and the application and assessment of adversarial profiles and tools, techniques, and procedures.

DURATION:

40 hours of course work, ideally delivered over five consecutive business days.

STUDENT PREREQUISITES:

There are no prerequisites for course attendance, but students benefit from possessing a relative working knowledge of networking and network security.

INTENDED AUDIENCE:

Individuals tasked with network defense, internal risk assessment, or the analysis of cyber threats to their respective organizations network benefit from the information provided in this course.

TESTING/CERTIFICATION

Course includes a certificate of attendance.

PRICE:

$4,600
CONTACT FOR GOVERNMENT PRICING

May
13
Mon
Cyber Threat Intelligence Analysis (Annapolis Junction, MD)
May 13 – May 17 all-day
Jun
3
Mon
Cyber Threat Intelligence Analysis (Colorado Springs, CO)
Jun 3 – Jun 7 all-day
Jul
15
Mon
Cyber Threat Intelligence Analysis (Honolulu, HI)
Jul 15 – Jul 19 all-day
Aug
5
Mon
Cyber Threat Intelligence Analysis (Colorado Springs, CO)
Aug 5 – Aug 9 all-day
Aug
19
Mon
Cyber Threat Intelligence Analysis (Annapolis Junction, MD)
Aug 19 – Aug 23 all-day
Sep
9
Mon
Cyber Threat Intelligence Analysis (Colorado Springs, CO)
Sep 9 – Sep 13 all-day
Sep
16
Mon
Cyber Threat Intelligence Analysis (Honolulu, HI)
Sep 16 – Sep 20 all-day
Oct
7
Mon
Cyber Threat Intelligence Analysis (Colorado Springs, CO)
Oct 7 – Oct 11 all-day
Nov
4
Mon
Cyber Threat Intelligence Analysis (Colorado Springs, CO)
Nov 4 – Nov 8 all-day
Dec
2
Mon
Cyber Threat Intelligence Analysis (Colorado Springs, CO)
Dec 2 – Dec 6 all-day
Dec
9
Mon
Cyber Threat Intelligence Analysis (Honolulu, HI)
Dec 9 – Dec 13 all-day

Human-Led. Technology-Accelerated.

Email Call 719.368.3677 (M-F 8-5)