VoD 2021/6. Capstone/1. Day 6 Capstone/15. Thanks for Coming.mp4 76.8 MB
VoD 2021/5. Dissemination and Attribution/4. Dissemination Strategic/20. Iran CIB Pros and Cons.mp4 47.5 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/13. Exercise 13.mp4 44.9 MB
VoD 2021/6. Capstone/1. Day 6 Capstone/12. Capstone.mp4 29.7 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/1. Introduction to Cyber Threat Intelligence and Requirements/6. Course Goal A Capable CTI Analyst.mp4 29.4 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/7. Mirror Image.mp4 29.3 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/5. The Simpsons Did It.mp4 28.7 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/2. Attribution as an Intelligence Requirement.mp4 27.7 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/26. Government Attribution.mp4 24.0 MB
VoD 2021/5. Dissemination and Attribution/4. Dissemination Strategic/3. Example Outcome Indictments.mp4 22.7 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/1. Introduction to Cyber Threat Intelligence and Requirements/1. Welcome to Cyber Threat Intelligence FOR578.mp4 21.9 MB
VoD 2021/5. Dissemination and Attribution/1. Introduction to Dissemination and Attribution/10. Lessons Learned.mp4 21.6 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/16. Creating an Activity Group.mp4 20.7 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/17. Exercise 42.mp4 20.5 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/8. OnetoOne Mapping Issues Example.mp4 19.1 MB
VoD 2021/4. Analysis and Production of Intelligence/2. Exploitation Storing and Structuring Data/3. Storing Platforms.mp4 18.9 MB
VoD 2021/4. Analysis and Production of Intelligence/1. Introduction to Analysis and Production of Intelligence/5. Human Operated Ransomware Operations.mp4 18.3 MB
VoD 2021/5. Dissemination and Attribution/4. Dissemination Strategic/15. Tips on Effective Report Writing.mp4 18.0 MB
VoD 2021/4. Analysis and Production of Intelligence/1. Introduction to Analysis and Production of Intelligence/3. Section 4 Outline.mp4 17.3 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/3. NamesIdentifiers.mp4 17.3 MB
VoD 2021/4. Analysis and Production of Intelligence/4. Analysis of Competing Hypotheses/11. Exercise 43.mp4 16.6 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/19. New Intrusion Does it Fit.mp4 16.5 MB
VoD 2021/5. Dissemination and Attribution/2. Dissemination Tactical/14. Case Study HackingTeam.mp4 16.1 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/11. Hindsight Bias.mp4 15.9 MB
VoD 2021/6. Capstone/1. Day 6 Capstone/14. Incorporate the Fifteen Axioms for Intelligence Analysts.mp4 15.8 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/3. Logical Fallacies.mp4 15.8 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/17. How the Carbanak Cybergang Stole 1B.mp4 15.7 MB
VoD 2021/5. Dissemination and Attribution/4. Dissemination Strategic/6. Lessons from the Field Shoe Company and AntiHype.mp4 15.2 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/6. Achieving the Value of Attribution without Attribution.mp4 14.0 MB
VoD 2021/5. Dissemination and Attribution/1. Introduction to Dissemination and Attribution/5. PlugX.mp4 13.7 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/4. Four Approaches to True Attribution.mp4 13.7 MB
VoD 2021/5. Dissemination and Attribution/2. Dissemination Tactical/2. Know the Audience.mp4 13.5 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/13. Case Study New York Stock Exchange NYSE Computer Glitch.mp4 13.0 MB
VoD 2021/5. Dissemination and Attribution/1. Introduction to Dissemination and Attribution/8. Axiom.mp4 12.7 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/2. Understanding Intelligence/21. Field of View Bias from Collection.mp4 11.9 MB
VoD 2021/5. Dissemination and Attribution/4. Dissemination Strategic/27. Indictments for TTP Discovery APT10.mp4 11.9 MB
VoD 2021/4. Analysis and Production of Intelligence/1. Introduction to Analysis and Production of Intelligence/4. Case Study Human Operated Ransomware.mp4 11.8 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/39. Action Selection and Mutual Exclusivity.mp4 11.7 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/8. Attribution Is Never Straightforward.mp4 11.6 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/1. Welcome to Cyber Threat Intelligence FOR578 Day 2.mp4 11.5 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/1. Introduction to Cyber Threat Intelligence and Requirements/5. Course Agenda.mp4 11.3 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/2. Style Guide.mp4 11.2 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/21. False Flag Example South Korean Winter Olympics.mp4 11.1 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/6. Rosetta Stone APT Groups and Operations Matrix.mp4 10.9 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/8. Case Study The First Ever Electric Grid Focused Malware.mp4 10.3 MB
VoD 2021/5. Dissemination and Attribution/4. Dissemination Strategic/24. APT10 and the Chinese State.mp4 10.3 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/15. Case Study Turkey Pipeline Explosion.mp4 10.1 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/29. Everyones a Little Wrong.mp4 8.6 MB
VoD 2021/4. Analysis and Production of Intelligence/5. Analysis Different Types of Analysis/5. MaltegoCasefile Bubble Chart View.mp4 8.6 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/39. Exercise 45.mp4 8.6 MB
VoD 2021/6. Capstone/1. Day 6 Capstone/1. Day 6 Capstone.mp4 8.5 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/3. Understanding Cyber Threat Intelligence/24. The Activity Groups.mp4 8.5 MB
VoD 2021/4. Analysis and Production of Intelligence/5. Analysis Different Types of Analysis/15. CTI Angle IntelligenceDriven Hypothesis Generation.mp4 8.4 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/40. Leveraging CoA Intel GainLoss.mp4 8.2 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/2. Understanding Intelligence/14. Hindrances to Good Analysis.mp4 8.2 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/9. Confirmation Bias.mp4 8.1 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/27. Group Names are Definitions not Often Publicly Known.mp4 8.1 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/2. Understanding Intelligence/28. Enter the CyberDragon.mp4 8.1 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/2. Understanding Intelligence/5. Case Study Operation Bodyguard.mp4 8.1 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/2. Making the Switch from Consuming to Generating.mp4 8.0 MB
VoD 2021/3. Collection Sources/2. Collection Source Malware/15. Exercise 31 Aggregating and Pivoting in Excel.mp4 8.0 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/5. Other Common Fallacies.mp4 7.9 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/47. Priority Intelligence Requirements.mp4 7.9 MB
VoD 2021/4. Analysis and Production of Intelligence/4. Analysis of Competing Hypotheses/1. Analysis of Competing Hypotheses 1.mp4 7.8 MB
VoD 2021/4. Analysis and Production of Intelligence/5. Analysis Different Types of Analysis/14. Findings and Aftermath.mp4 7.7 MB
VoD 2021/5. Dissemination and Attribution/2. Dissemination Tactical/15. Case Study HackingTeam 1.mp4 7.7 MB
VoD 2021/6. Capstone/1. Day 6 Capstone/11. Your Resources.mp4 7.6 MB
VoD 2021/4. Analysis and Production of Intelligence/4. Analysis of Competing Hypotheses/5. 3 Diagnostics.mp4 7.5 MB
VoD 2021/5. Dissemination and Attribution/1. Introduction to Dissemination and Attribution/7. Hikit Malware and Bit9.mp4 7.4 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/1. A Specific Intelligence Requirement Attribution.mp4 7.3 MB
VoD 2021/5. Dissemination and Attribution/2. Dissemination Tactical/18. HackingTeams Compromise and Mercenary Group Takeaways.mp4 7.3 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/25. The Sony Attack.mp4 7.3 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/4. Threat Intelligence Consumption/10. The Four Types of Threat Detection.mp4 7.3 MB
VoD 2021/4. Analysis and Production of Intelligence/4. Analysis of Competing Hypotheses/2. Analysis of Competing Hypotheses 2.mp4 7.2 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/6. Structuring Your Team to Generate Intelligence.mp4 7.2 MB
VoD 2021/5. Dissemination and Attribution/4. Dissemination Strategic/26. Indictments for Attribution APT10.mp4 7.1 MB
VoD 2021/5. Dissemination and Attribution/3. Dissemination Operational/3. Communicating About Adversary Operations.mp4 7.1 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/16. Bias and Experience.mp4 7.0 MB
VoD 2021/4. Analysis and Production of Intelligence/1. Introduction to Analysis and Production of Intelligence/8. Ryuk from TrickBot Infections.mp4 6.9 MB
VoD 2021/4. Analysis and Production of Intelligence/1. Introduction to Analysis and Production of Intelligence/9. Make It Easy for Defenders.mp4 6.9 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/22. Coming to the EndReassess Intelligence Requirements.mp4 6.8 MB
VoD 2021/3. Collection Sources/3. Collection Source Domains/14. Case Study Poison Hurricane.mp4 6.8 MB
VoD 2021/5. Dissemination and Attribution/3. Dissemination Operational/6. ISACs and ISAOs.mp4 6.7 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/1. Introduction to Cyber Threat Intelligence and Requirements/11. Investigating Moonlight Maze.mp4 6.7 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/2. Understanding Intelligence/18. Kills Chains and Other Structured Models Data into Buckets.mp4 6.2 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/7. There is No OnetoOne Mapping.mp4 6.2 MB
VoD 2021/6. Capstone/1. Day 6 Capstone/6. VI Capstone.mp4 5.9 MB
VoD 2021/6. Capstone/1. Day 6 Capstone/4. Capstone How to Win.mp4 5.9 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/18. Key Indicators and Insights from the Exercises Intrusion.mp4 5.9 MB
VoD 2021/5. Dissemination and Attribution/1. Introduction to Dissemination and Attribution/3. Section 5 Outline.mp4 5.8 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/4. Threat Intelligence Consumption/11. Moving Indicators to Threat Behavioral Analytics.mp4 5.8 MB
VoD 2021/4. Analysis and Production of Intelligence/1. Introduction to Analysis and Production of Intelligence/7. Doppelpaymer Ransomware.mp4 5.8 MB
VoD 2021/5. Dissemination and Attribution/4. Dissemination Strategic/5. Expectations.mp4 5.8 MB
VoD 2021/6. Capstone/1. Day 6 Capstone/3. Capstone What to Know To Have Fun.mp4 5.8 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/10. Exercise 13 The Evolving Situation.mp4 5.8 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/26. Recorded Future and Rapid7 Attributed Breaches to APT10.mp4 5.8 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/20. Adding Intrusions to the Diamond Model Creating a Group.mp4 5.6 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/10. Discovery Findings Proxy Logs.mp4 5.6 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/13. Key Indicators and Insights from the Slides Intrusion.mp4 5.5 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/6. Planning and Direction/5. A Sample Internal Collection Management Framework.mp4 5.5 MB
VoD 2021/4. Analysis and Production of Intelligence/1. Introduction to Analysis and Production of Intelligence/1. Analysis and Production of Intelligence.mp4 5.5 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/6. Planning and Direction/18. Exercise 14 Positioning for the Future 1.mp4 5.5 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/4. Threat Intelligence Consumption/4. Leverage Intelligence to Drive Value.mp4 5.4 MB
VoD 2021/4. Analysis and Production of Intelligence/5. Analysis Different Types of Analysis/11. John Doe.mp4 5.3 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/28. The Problem Isnt just a Recorded Future Rapid7 Problem.mp4 5.3 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/12. Categorize Evidence Using Kill Chain and the Diamond Model.mp4 5.1 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/1. Analysis Clustering Intrusions.mp4 5.1 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/16. Understanding Opportunity.mp4 5.1 MB
VoD 2021/5. Dissemination and Attribution/4. Dissemination Strategic/4. Making the Business Case for Security.mp4 5.1 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/18. Recap of K Lazutin.mp4 5.0 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/6. Planning and Direction/19. Exercise 14 Positioning for the Future 2.mp4 4.9 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/23. Rule of 2 Forming an Activity Group.mp4 4.9 MB
VoD 2021/4. Analysis and Production of Intelligence/1. Introduction to Analysis and Production of Intelligence/11. What Evil Looks Like.mp4 4.9 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/7. Stage 1 Recon Precursors.mp4 4.9 MB
VoD 2021/5. Dissemination and Attribution/3. Dissemination Operational/24. Case Study Metrics from CTI Summit.mp4 4.9 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/13. The Basics of State Attribution.mp4 4.9 MB
VoD 2021/5. Dissemination and Attribution/2. Dissemination Tactical/6. Hex Special Values.mp4 4.4 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/2. Understanding Intelligence/27. Case Study Operation Aurora 2.mp4 4.4 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/22. Actions on Objectives Network Pivoting Overview.mp4 4.4 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/3. Understanding Cyber Threat Intelligence/12. Tactics Techniques and Procedures.mp4 4.3 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/3. Understanding Cyber Threat Intelligence/11. AdversaryThreat Personas and TargetsVictims.mp4 4.3 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/3. Priority Intelligence Requirements.mp4 4.3 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/1. Analysis Logical Fallacies and Cognitive Biases.mp4 4.3 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/28. Reported Intrusion Victim Pivot 2 Proxy Search from Flow Data.mp4 4.2 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/4. Threat Intelligence Consumption/3. Sliding Scale of Cyber Security.mp4 4.2 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/9. Example Merged State and Criminal Activity.mp4 4.2 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/22. Shortcut The Rule of 2.mp4 4.2 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/28. Merging the Diamond Model and Kill Chain.mp4 4.2 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/17. Different Examples of Diamond Models for Different Reqs.mp4 3.9 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/9. Ukraine December 2016.mp4 3.8 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/2. Understanding Intelligence/15. Bias Example Ransomware Targeting Elections.mp4 3.8 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/12. Illusory Correlation.mp4 3.7 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/13. Pivoting on New Intelligence.mp4 3.7 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/30. Ex 45 Lead In.mp4 3.7 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/1. Introduction to Cyber Threat Intelligence and Requirements/10. Targeting Government and Military Networks.mp4 3.7 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/24. Adversary Human Fingerprints Examples in Malware.mp4 3.7 MB
VoD 2021/3. Collection Sources/1. Introduction to Collection Sources/6. HEXANE DanBot Header Metadata Compile Times and PDBs.mp4 3.7 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/27. Reported Intrusion C2 Victim Pivot 2 Flow Data to Known Malicious IPs.mp4 3.6 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/52. Phase 4 Exploitation Findings and Problems.mp4 3.4 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/1. Introduction to Cyber Threat Intelligence and Requirements/7. FOR578 GCTI School of Thought.mp4 3.4 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/14. Cum hoc ergo propter hoc.mp4 3.4 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/4. Threat Intelligence Consumption/7. Active Defense Intelligence Consumption.mp4 3.4 MB
VoD 2021/5. Dissemination and Attribution/4. Dissemination Strategic/30. Observations for CTI Analysts Communicating Broadly.mp4 3.4 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/6. Planning and Direction/3. Planning Collection Management Framework.mp4 3.3 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/2. Understanding Intelligence/23. Example Tools for Structured Analytic Techniques.mp4 3.3 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/38. Recap of Leet Intrusion Set.mp4 3.3 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/55. What Happened.mp4 3.3 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/29. One Phases Choices May Move in Another Phase.mp4 3.3 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/16. Priority Intelligence Requirements in Ex 25 1.mp4 3.3 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/43. C2 Decoding with Command Line and Scripting.mp4 3.2 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/2. Understanding Intelligence/13. Analysis in Action.mp4 3.2 MB
VoD 2021/4. Analysis and Production of Intelligence/4. Analysis of Competing Hypotheses/7. 5 Prioritize the Hypotheses.mp4 3.2 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/4. Section 2 Outline.mp4 3.2 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/6. Planning and Direction/11. Pivoting off Information and Resources.mp4 3.2 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/3. Understanding Cyber Threat Intelligence/15. Indicator Life Cycle Introduction.mp4 3.1 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/49. Exercise 21 Takeaways.mp4 3.1 MB
VoD 2021/5. Dissemination and Attribution/2. Dissemination Tactical/7. More Complex YARA Rules.mp4 3.1 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/1. Introduction to Cyber Threat Intelligence and Requirements/14. Putting the Pieces Together.mp4 3.1 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/1. Introduction to Cyber Threat Intelligence and Requirements/13. Connections to the Present Penquin Turla.mp4 3.1 MB
VoD 2021/4. Analysis and Production of Intelligence/5. Analysis Different Types of Analysis/12. The Challenge of Data.mp4 3.0 MB
USB 2021/Lab_Setup_Instructions_SGFOR578_v02.pdf 3.0 MB
VoD 2021/6. Capstone/1. Day 6 Capstone/2. Capstone The Goals.mp4 3.0 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/14. Analytical Model for Each Entity.mp4 3.0 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/24. Operation Troy and Attacks on South Korean Organizations.mp4 2.9 MB
VoD 2021/5. Dissemination and Attribution/4. Dissemination Strategic/25. APT10 and the US Government.mp4 2.9 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/26. Reported Intrusion C2 Victim Pivot 1 FTP Network Traffic.mp4 2.9 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/20. Exercise 22 Takeaways.mp4 2.9 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/24. Reported Intrusion C2 Victim Pivot FTP Flow Data.mp4 2.8 MB
VoD 2021/5. Dissemination and Attribution/3. Dissemination Operational/5. NationalLevel Government Information.mp4 2.8 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/43. Different Models for Different Use Cases.mp4 2.6 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/41. COURSE RESOURCES AND CONTACT INFORMATION.mp4 2.6 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/6. Planning and Direction/6. Systems Analysis.mp4 2.2 MB
VoD 2021/4. Analysis and Production of Intelligence/1. Introduction to Analysis and Production of Intelligence/10. Example of Effective Visual Communication of TTPs.mp4 2.2 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/2. Understanding Intelligence/26. Case Study Operation Aurora 1.mp4 2.2 MB
VoD 2021/4. Analysis and Production of Intelligence/5. Analysis Different Types of Analysis/7. Temporal Data Analysis 1.mp4 2.2 MB
VoD 2021/4. Analysis and Production of Intelligence/3. Analysis Logical Fallacies and Cognitive Biases/2. Identifying and Defeating Bias.mp4 1.8 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/1. Introduction to Cyber Threat Intelligence and Requirements/9. Case Study Moonlight Maze.mp4 1.8 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/23. Actions on Objectives Host Pivoting Overview.mp4 1.8 MB
VoD 2021/4. Analysis and Production of Intelligence/5. Analysis Different Types of Analysis/4. Common Link Analysis Tools.mp4 1.8 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/12. Delivery Example HTTP.mp4 1.8 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/6. Planning and Direction/9. Building a Threat Model Review Your Critical Systems and Information.mp4 1.8 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/17. Stage 6 Command and Control C2.mp4 1.8 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/8. Recon Example.mp4 1.7 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/4. Threat Intelligence Consumption/12. The Pyramid of Pain.mp4 1.7 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/41. C2 Protocol for scvhostexeFJerk.mp4 1.7 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/2. The Fundamental Skill Set Intrusion Analysis.mp4 1.7 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/9. Stage 2 Weaponization.mp4 1.7 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/1. Preparing the Team to Generate Intelligence.mp4 1.7 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/50. Responder Action Reverse Engineers RFIs.mp4 1.6 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/27. Diamond Victim.mp4 1.6 MB
VoD 2021/3. Collection Sources/3. Collection Source Domains/28. Exercise 32 Expanding Intelligence Through Partners and OSINT.mp4 1.5 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/11. Challenges in Observing the Adversarys Intel Life Cycle.mp4 1.5 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/10. Weaponization Example Trojanized Document.mp4 1.5 MB
VoD 2021/3. Collection Sources/5. Collection Source TLS Certificates/14. Unique Data from New Pivot Type.mp4 1.5 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/29. Reported Intrusion Current Knowledge Gaps 1.mp4 1.5 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/6. Planning and Direction/14. The VERIS Framework.mp4 1.5 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/2. Where Are We and Where Do We Go 1.mp4 1.5 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/11. Scenario Companies and Organizations.mp4 1.5 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/15. Carberp.mp4 1.5 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/18. C2 Example Sleep.mp4 1.4 MB
VoD 2021/3. Collection Sources/3. Collection Source Domains/15. Autonomous System Number ASN Lookups.mp4 1.4 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/6. Planning and Direction/17. Using VERIS to Track Threats.mp4 1.4 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/20. Actions Example.mp4 1.4 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/7. A Few Sample Purposes of a Cyber Threat Intelligence Team.mp4 1.4 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/5. Preparing the Team to Generate Intelligence/12. Details Roles and Requirements.mp4 1.4 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/33. Phase 7 Discovery Disk Forensics 1.mp4 1.4 MB
VoD 2021/4. Analysis and Production of Intelligence/2. Exploitation Storing and Structuring Data/4. MISP.mp4 1.4 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/3. Memory Analysis with Volatility.mp4 1.4 MB
VoD 2021/1. Cyber Threat Intelligence and Requirements/3. Understanding Cyber Threat Intelligence/20. Case Study PROMETHIUM and NEODYMIUM.mp4 1.4 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/10. Reported Intrusion Where Are We and Where Do We Go.mp4 1.4 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/6. Kill Chain Overview.mp4 1.3 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/9. Confidently Correlating Clusters.mp4 1.3 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/7. Where Are We and Where Do We Go 2.mp4 1.3 MB
VoD 2021/4. Analysis and Production of Intelligence/2. Exploitation Storing and Structuring Data/6. Visually Linking Indicators Between Events.mp4 1.3 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/44. The Beginning of a Persona.mp4 1.3 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/21. Phase 7 Actions on Objectives.mp4 1.3 MB
VoD 2021/5. Dissemination and Attribution/3. Dissemination Operational/16. Why You Should Embrace Metrics.mp4 1.2 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/20. False Flags.mp4 1.2 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/14. ExploitDelivery Loop SMTPHTTP.mp4 1.2 MB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/15. Categorize Evidence Using Threat Definition.mp4 1.2 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/53. Responder Action User Inbox Archive.mp4 1.2 MB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/10. ACH for IntrusionCluster Correlation.mp4 1.2 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/21. Introduction to the Diamond Model.mp4 1.2 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/30. C2 Decoding Overview.mp4 1.1 MB
VoD 2021/3. Collection Sources/4. Collection Source External Datasets/23. For the Next Lab Recorded FutureSearch Menu.mp4 1.1 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/32. Reported Intrusion Memory Forensics 2.mp4 1.1 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/14. Exercise 25.mp4 1.1 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/16. Reported Intrusion Where Do We Go.mp4 1.1 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/8. Phase 3 DeliveryFindings.mp4 1.1 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/46. Details Roles and Requirements 2.mp4 1.1 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/32. CoA Discover.mp4 1.0 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/40. Capabilities of scvhostexeFJerk.mp4 1.0 MB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/26. Diamond Infrastructure.mp4 1.0 MB
VoD 2021/5. Dissemination and Attribution/4. Dissemination Strategic/21. Kasperskys Equation Group Optional.mp4 1021.6 KB
VoD 2021/5. Dissemination and Attribution/1. Introduction to Dissemination and Attribution/4. Case Study Axiom.mp4 1020.8 KB
VoD 2021/3. Collection Sources/3. Collection Source Domains/5. Data Pivoting Example 1.mp4 1016.8 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/9. Responder Action Proxy Logs.mp4 1005.4 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/15. Stage 5 Installation.mp4 1002.6 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/47. Reported Intrusion Current Knowledge Gaps 2.mp4 998.4 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/36. CoA Degrade.mp4 983.2 KB
VoD 2021/3. Collection Sources/5. Collection Source TLS Certificates/11. Identifying Links Between Data Points.mp4 980.5 KB
VoD 2021/5. Dissemination and Attribution/3. Dissemination Operational/4. Partners and Collaboration.mp4 961.5 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/36. Exercise 23.mp4 955.7 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/9. The Time Card System.mp4 925.3 KB
VoD 2021/3. Collection Sources/5. Collection Source TLS Certificates/13. Identification of New Data.mp4 908.3 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/12. Visual Representation of Adversarys Efforts.mp4 842.3 KB
VoD 2021/4. Analysis and Production of Intelligence/2. Exploitation Storing and Structuring Data/7. Methods of Storing Best Practices.mp4 839.3 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/15. Some Key Items Collected Out of the Intrusion.mp4 836.1 KB
VoD 2021/1. Cyber Threat Intelligence and Requirements/6. Planning and Direction/21. SANS DFIR.mp4 824.1 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/5. Reported Intrusion Current Knowledge.mp4 821.5 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/19. Priority Intelligence Requirements in Exercise Scenario.mp4 717.8 KB
VoD 2021/4. Analysis and Production of Intelligence/5. Analysis Different Types of Analysis/10. Case Study Panama Papers.mp4 693.7 KB
VoD 2021/4. Analysis and Production of Intelligence/6. Analysis Clustering Intrusions/11. The Basics.mp4 675.1 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/56. Exercise 24.mp4 674.4 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/38. CoA Destroy.mp4 672.4 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/37. Priority Intelligence Requirements in Ex 23.mp4 667.9 KB
VoD 2021/3. Collection Sources/1. Introduction to Collection Sources/4. Case Study HEXANE.mp4 648.5 KB
VoD 2021/1. Cyber Threat Intelligence and Requirements/6. Planning and Direction/12. Getting the Information You Need.mp4 633.4 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/31. The Courses of Action Matrix.mp4 626.1 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/18. Exercise 22.mp4 620.9 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/45. Details Roles and Requirements 1.mp4 610.6 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/57. Priority Intelligence Requirements in Ex 24.mp4 558.6 KB
VoD 2021/3. Collection Sources/3. Collection Source Domains/23. For the Next Lab DomainTools.mp4 556.3 KB
VoD 2021/5. Dissemination and Attribution/5. A Specific Intelligence Requirement Attribution/23. Case Study Lazarus Group.mp4 542.1 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/14. Observing the Indicator Life Cycle.mp4 519.2 KB
VoD 2021/4. Analysis and Production of Intelligence/2. Exploitation Storing and Structuring Data/1. Exploitation Storing and Structuring Data.mp4 498.8 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/2. Kill Chain and Diamond Deep Dive/48. Moving into the System.mp4 491.1 KB
VoD 2021/3. Collection Sources/3. Collection Source Domains/6. Data Pivoting Example 2.mp4 292.3 KB
VoD 2021/3. Collection Sources/3. Collection Source Domains/31. Case Study GlassRAT.mp4 276.5 KB
VoD 2021/4. Analysis and Production of Intelligence/1. Introduction to Analysis and Production of Intelligence/2. Course Agenda.mp4 274.4 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/44. Exercise 21 Read In.mp4 271.5 KB
VoD 2021/4. Analysis and Production of Intelligence/1. Introduction to Analysis and Production of Intelligence/6. Wadhrama Attack Chain by PARINACOTA.mp4 264.6 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/1. Handling Multiple Kill Chains.mp4 236.2 KB
VoD 2021/5. Dissemination and Attribution/2. Dissemination Tactical/12. Validating Signatures and IOCs.mp4 226.8 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/21. COURSE RESOURCES AND CONTACT INFORMATION.mp4 80.9 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/1. Primary Collection Source Intrusion Analysis/5. Primary Collection Source Intrusion Analysis.mp4 47.5 KB
VoD 2021/2. The Fundamental Skill Set Intrusion Analysis/3. Handling Multiple Kill Chains/20. Here is my lens You know my methods Sherlock Holmes.mp4 42.3 KB
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.