Course Description
Course contents
- Introduction to Cyber Threat Intelligence and CTI Models
- The intelligence process
- The cybercrime eco systems
- Advanced searching and Google hacking
- Data collection and sources
- Data sharing tools
- Leveraging DNS for threat intelligence
- The Malware Information Sharing Platform
- Honeypots, malware labs and other tools
- OPSEC
- Introduction to attribution
Target audience
- Network analysts and defenders
- SOC analysts
- Incident responders
- Anyone who is interested in learning a new skillset that will allow them to get ahead of their adversaries
Requirements
- Basic scripting (bash/python)
- Understanding of malware and networking
Hardware/Software Requirements
- Laptop capable of running VMs
Trainer Biography
Irena Damsky is the founder of damsky.tech – CTI Research, Training and Consulting. She is a security and intelligence researcher and developer based in Israel. Her focus is on threat intelligence, networking, malware & data analysis and taking out bad guys as she is running the company and provides the different services.
Prior to starting damsky.tech, Irena held different roles in the industry from ranging from Threat intelligence leader to VP of Security Research and served over six years in the Israeli Intelligence Forces, where she now holds the rank of Captain in the Reserve Service. She is a frequent speaker at security events, holds a BSc and MSc in Computer Science, and is fluent in English, Russian, and Hebrew.
Website: https://damsky.tech
Twitter: @DamskyIrena
LinkedIN: https://www.linkedin.com/in/irenadam/