Skip to content
Weaver Heavy Industries edited this page Dec 14, 2017 · 2 revisions

Curriculum:

1: Cyber Threat Intelligence and Requirements

  • [Using Structured Analytical Techniques]
  • [Consuming Along the Sliding Scale]
  • [Enriching and Understanding Limitations]
  • [Strategic Threat Modeling]

2: Intrusion Analysis

  • [Using Structured Analytical Techniques]
  • [Consuming Along the Sliding Scale]
  • [Enriching and Understanding Limitations]
  • [Strategic Threat Modeling]

3: Collection Sources

  • [Open-Source Intelligence and Domain Pivoting in DomainTools]
  • [Maltego Pivoting and Open-Source Intelligence]
  • [Sifting Through Massive Amounts of Open-Source Intelligence in RecordedFuture]
  • [TLS Certificate Pivoting]
  • [Storing Threat Data and Information in a Malware Information Sharing Platform (MISP)]

4: Analysis and Dissemination of Intelligence

  • [Analysis of Competing Hypotheses]
  • [Visual Analysis in Maltego]
  • [The Rule of 2]
  • [YARA Rule Development]
  • [STIX Framework IOC Extraction and Development]
  • [Building a Campaign Heat Map]

5: Higher-Order Analysis and Attribution

  • [Identifying Cognitive Biases in Media Reporting]
  • [Analysis of Intelligence Reports]
  • [Capstone Exercise: Debating and Attributing Election Influencing - Part 1]
  • [Capstone Exercise: Debating and Attributing Election Influencing - Part 2]