Jump to

At a glance

This course provides an introduction to threat intelligence and attribution. It is designed to provide insight into attribution methodology and demonstrate the proper handling of threat intelligence information.

The course explores the main components of a threat group and shows how Mandiant analysts use raw tactical intelligence and weigh connections and relationships to build a set of related activities that correspond to a group of threat actors. Learners can become familiar with several factors they should consider when attributing related activity, and view real-world examples of research and pivoting. The course also examines operational and strategic intelligence, which helps determine the “who” and the “why” behind an attack.

The course clarifies critical security terminology to help learners separate valuable information from hype.

Prerequisites: A working understanding of basic information security principles. A general understanding of threat intelligence and indicators of compromise (IoCs). Experience conducting forensic analysis, network traffic analysis, log analysis, security assessments and penetration testing, security architecture and system administration duties are a plus, but not required.

Course goals

After completing this course, learners should be able to:

  • Understand various definitions of threat intelligence and attribution
  • Distinguish between tactical, operational, and strategic threat intelligence
  • Use tactical intelligence in the early stages of a cyber attack to evaluate data and correctly identify indicators that can be grouped into a set of related activity and attributed to a threat group
  • Gain insight into common errors that can occur when analyzing common forensic artifacts and interpreting information presented from various sources
  • Examine operational and strategic intelligence to determine the attribution and sponsorship of an attack operation
  • Understand how attribution analysis can provide crucial context to threat activity that enables more informed decisions and improved resource allocation
  • Understand why attributing cyber operations to a threat group can have significant implications—and even affect geopolitical dynamics
  • Consider attribution from a threat group’s point of view

Who this course helps

Cyber intelligence analysts, cyber threat analysts, security analysts, and penetration testers.

How it works

Delivery methods

In-classroom or virtual instructor-led training

Duration

  • One day (in-person delivery)
  • Two days (virtual delivery)