Instructor-led training course
This course provides an introduction to threat intelligence and attribution. It is designed to provide insight into attribution methodology and demonstrate the proper handling of threat intelligence information.
The course explores the main components of a threat group and shows how Mandiant analysts use raw tactical intelligence and weigh connections and relationships to build a set of related activities that correspond to a group of threat actors. Learners can become familiar with several factors they should consider when attributing related activity, and view real-world examples of research and pivoting. The course also examines operational and strategic intelligence, which helps determine the “who” and the “why” behind an attack.
The course clarifies critical security terminology to help learners separate valuable information from hype.
Prerequisites: A working understanding of basic information security principles. A general understanding of threat intelligence and indicators of compromise (IoCs). Experience conducting forensic analysis, network traffic analysis, log analysis, security assessments and penetration testing, security architecture and system administration duties are a plus, but not required.
After completing this course, learners should be able to:
Cyber intelligence analysts, cyber threat analysts, security analysts, and penetration testers.
In-classroom or virtual instructor-led training