Star 0

Abstract

DURATION: 2 DAYS
CAPACITY: 20 pax
SEATS AVAILABLE: REGISTRATION CLOSED
PRICE:   USD1499 / MYR4999 (early bird)
USD1899 / MYR6199 (normal)
Early bird registration rate ends on the 1st of August
REGISTER NOW

Overview
Threat Intelligence is critical to the safety of organizations and most people still don’t understand what it is and how to implement it in a practical manner. “Practical Threat Intelligence” will bring you up to speed using a range of hands-on labs to ensure that you walk away with the skills necessary to implement Threat Intelligence into your organization!
To operate within this ever evolving global threat environment, organizations must mature their traditional security strategies to include Intelligence-Based Security, also commonly referred to as Threat Intelligence. Rather than reacting to alerts for attacks, Intelligence-Based Security enables you to proactively identify threats against your organization and dissolve them before an attack has been launched.
“Practical Threat Intelligence” will develop your hands-on practical skills and knowledge in the following areas:
Intelligence Strategy
•  Threat Intelligence
•  Threat Trending
•  Threat Reports
•  Critical Asset Identification
•  Intelligence Protection Techniques
•  Intelligence Buy-In
Intelligence Aggregation
•  Open Source Intelligence
•  Human Intelligence
•  Counter Intelligence
•  Internal Intelligence
•  Intelligence Data Formats
•  Intelligence Sources
•  Reputation Services
•  Aggregation of Intelligence
Intelligence Capabilities
•  Intelligence Systems
•  Intelligence Architecture
•  Intelligence Services
•  Indicators of Compromise
•  Incident Response (or more accurately Incident Pre-sponse)
•  Automated Response
Threat Analysis
•  Cyber Kill Chain
•  Hacker Profiling
•  Hacker Tracking
•  Big Data Analytics
•  Threat Data Visualization
•  Threat Intent
•  Threat Likelihood
•  Threat Impact
Operational Intelligence
•  Actionable Intelligence
•  Course of Action
•  Automated Proactive Defense
•  Manual Proactive Defense
•  Threat Dissemination
•  Intelligence Sharing
•  Intelligence Strategy, Process and Systems Review
Who Should Attend
• Security Officers
• Security Managers
• Security Auditors
• System Administrators
• Penetration Testers
• Security Developers
Hardware / Software Requirements
• A working laptop (Windows, Mac or Linux) to run 1 x 64-bit VMware VMs,
• MINIMUM 2048 MB RAM required.
• Ethernet network port
• 20 GB free Hard disk space
• Latest version of VMware Player (or Workstation, Server, Fusion, etc)
•  An SSH client, such as PuTTY or Terminal
Students will be provided with
•  “Virtual Threat Intelligence Environment” (VMs with Intelligence systems and data)
• Practical Threat Intelligence workbook
• Lab instructions and solutions