From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Leveraging threat intelligence
From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts
Leveraging threat intelligence
- [Presenter] Threat actors use a variety of ways to launch attacks to gain access into our systems. Cyber threat intelligence helps level the playing field as it uses previous threat knowledge and reputation to proactively block malicious attacks on a network. Today, we have many organizations that offer detailed threat information that is vital to cyber security specialist. We use security blogs and podcasts that help professionals understand and mitigate emerging threats. For example, here I'm at sans.org for training and resources. You can take a look at their focus areas and even get involved. FireEye offers emerging threat information and intelligent reports. FireEye owns Mandiant so we'll see the reports listed under Mandiant. I signed up and downloaded the report that outlined cyber intelligence. And you can do the same and take a look at it. But really what I wanted to show you is that there's a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
Recognizing the complexity of today’s environment3m 46s
-
Leveraging threat intelligence5m 13s
-
Hunting threats4m 23s
-
Analyzing malware2m 35s
-
Dissecting malware using reverse engineering6m 40s
-
Detecting anomalies using the sliding window4m 50s
-
Comparing detection methods4m 10s
-
Using five-tuple log analysis4m 48s
-
Monitoring data loss using traffic profiles4m 24s
-
-
-