TECH TRAINING 3: Practical Threat Intelligence

DURATION: 2 DAYS

CAPACITY: 20 pax

SEATS AVAILABLE: REGISTRATION CLOSED

PRICE:   USD1499 / MYR4999 (early bird)

USD1899 / MYR6199 (normal)

Early bird registration rate ends on the 1st of August


Overview

Threat Intelligence is critical to the safety of organizations and most people still don’t understand what it is and how to implement it in a practical manner. “Practical Threat Intelligence” will bring you up to speed using a range of hands-on labs to ensure that you walk away with the skills necessary to implement Threat Intelligence into your organization!

To operate within this ever evolving global threat environment, organizations must mature their traditional security strategies to include Intelligence-Based Security, also commonly referred to as Threat Intelligence. Rather than reacting to alerts for attacks, Intelligence-Based Security enables you to proactively identify threats against your organization and dissolve them before an attack has been launched.

“Practical Threat Intelligence” will develop your hands-on practical skills and knowledge in the following areas:

Intelligence Strategy

•  Threat Intelligence
•  Threat Trending
•  Threat Reports
•  Critical Asset Identification
•  Intelligence Protection Techniques
•  Intelligence Buy-In

Intelligence Aggregation

•  Open Source Intelligence
•  Human Intelligence
•  Counter Intelligence
•  Internal Intelligence
•  Intelligence Data Formats
•  Intelligence Sources
•  Reputation Services
•  Aggregation of Intelligence

Intelligence Capabilities

•  Intelligence Systems
•  Intelligence Architecture
•  Intelligence Services
•  Indicators of Compromise
•  Incident Response (or more accurately Incident Pre-sponse)
•  Automated Response

Threat Analysis

•  Cyber Kill Chain
•  Hacker Profiling
•  Hacker Tracking
•  Big Data Analytics
•  Threat Data Visualization
•  Threat Intent
•  Threat Likelihood
•  Threat Impact

Operational Intelligence

•  Actionable Intelligence
•  Course of Action
•  Automated Proactive Defense
•  Manual Proactive Defense
•  Threat Dissemination
•  Intelligence Sharing
•  Intelligence Strategy, Process and Systems Review

Who Should Attend

• Security Officers
• Security Managers
• Security Auditors
• System Administrators
• Penetration Testers
• Security Developers

Hardware / Software Requirements

• A working laptop (Windows, Mac or Linux) to run 1 x 64-bit VMware VMs,
• MINIMUM 2048 MB RAM required.
• Ethernet network port
• 20 GB free Hard disk space
• Latest version of VMware Player (or Workstation, Server, Fusion, etc)
•  An SSH client, such as PuTTY or Terminal

Students will be provided with

•  “Virtual Threat Intelligence Environment” (VMs with Intelligence systems and data)
• Practical Threat Intelligence workbook
• Lab instructions and solutions

TRAINING
Location: InterContinental KL Date: October 13, 2014 Time: 9:00 am - 6:00 pm Ty Miller