Overview
This course aims to teach learners how to leverage threat intelligence for prioritizing detection sources. The course covers topics such as trap modeling, identifying threat actors, utilizing external and internal threat intelligence sources, and identifying detection sources using tools like MISRA Matrix and MicroAttack Navigator. The teaching method includes presentations, exercises, and visualizations. This course is intended for security specialists, decision-makers, entrepreneurs, and developers in the field of information security.
Syllabus
Introduction
Who am I
Trap modeling
Threat intelligence sources
What is MISRA
MISRA Matrix
Identifying threat actors
Identifying draft actors
External threat intelligence sources
Internal threat intelligence sources
MicroAttack Navigator
Identifying detection sources
Detect
Data Sources
List of Detection Sources
Example Exercise
Navigator Visualization
Customer Example
Remarks
Outro
Taught by
DefCamp