logo

Chapter 10 - Threat Intelligence - Risk Assessor - 12/25

Chapter 10 - Threat Intelligence - Risk Assessor - 12/25
Course content
Chapter Kick-off
Threat Intelligence Chapter Kick-off
Threat Intelligence Principles
The Unknown
Face the Unknown
Threat Intelligence Definition
The Importance of Threat Intelligence
Types of Threat Intelligence
Strategic
Operational
Tactical
Intelligence Meets Security
Threat Intelligence Cycle
Direction
Collection
Analysis
Dissemination and Feedback
Indicators of Compromise
Domains
Domain Lookup
AbuseIPDB
Hash Values
Network Artifacts
Host Artifacts
Windows Registry Artifacts
Adversary Tools
Shodan
Google Hacking
Google Hacking Overview
Google Operators
Boolean Operators
The Most Common Operators
Google Operators - Knowledge Check
Internet of Things (IOT) and Industrial Control Systems (ICS)
What Is IoT?
IoT Applications in Different Domains
IoT Threats
IoT Security
Ready, Set, Lab!- Searching Shodan
What Are ICS?
SCADA
DCS
SCADA vs. DCS
SCADA and DCS Threats
SCADA and Best Practices
Disaster Recovery
Introduction to Disaster Recovery
Disaster Recovery and Threat Intelligence
Essential Concepts and Objectives
What is DRP?
Components and Structure of DRP
Disaster Recovery Team Responsibilities
Testing, Maintenance, and Updating of DRPs
Identifying Potential Threats and Vulnerabilities
Conducting a Business Impact Analysis (BIA)
Analyzing Risk Factors and Their Impact on Business Operations
What is BCP?
Key Elements of BCP Development
Role of a BCP in Disaster Recovery
What is Data Backup and Recovery?
Backup Strategies and Methods
Data Restoration and Recovery Techniques
Chapter Closure
Threat Intelligence Quiz
10Questions

TechDX