SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
How to Become a
Cyber-threat Intelligence
Analyst
Frank Satterwhite
NetCom Learning
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
AGENDA
What is a Threat Intelligence Analyst?
Skills Needed to Become a Threat Intelligence Analyst
Sample Threat Intelligence Report
Why You Will Be In Demand: Leaders Need You
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
WHAT IS A THREAT INTELLIGENCE ANALYST? A WEATHER MAN
• Helps an Organization understand its assets, infrastructure, personnel and business
operations
• Within the context of the business, identifies opportunities to malicious actors.
• Identifies potential vulnerabilities and helps business operations prepare accordingly.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
SKILLS NEEDED TO BECOME A THREAT INTELLIGENCE ANALYST
The Biggest Requirement is to be SMART!
Cyber threat analysts apply scientific and technical knowledge to solving complex
intelligence problems. Threat Analyst must be able to take initiative, be creative, and have
analytical skills. A Common Profile:
1. Undergraduate and preferably graduate degree in Computer Science or Information
Security related field.
2. IT Security Certfications conveying both technical and theoritical understanding
3. Familiarity with Open Source Intelligence Tools (OSINT)
a. Ability to Collect and Analyze Indicators of Compromise
b. Conduct All-Source Analysis
4. Support Digital Forensics
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
SAMPLE THREAT INTELLIGENCE REPORT
• 1. Executive Summary
• 2. Key findings
• 3. Background
• 4. Covid-19 Attacks
• 5. IOCs for the campaigns are provided somewhere in the report, usually in the
appendix.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
INCIDENT SUMMARY TAKEN FROM RECORDING FUTURES
REPORTING:
• The AZORuIt malware was observed being delivered by phishing documents that used COVID-19 as a lure in
early February 2020. Researchers at Proofpoint observed a COVID-19-themed phishing campaign targeting
the manufacturing, industrial, finance, transportation, pharmaceutical, and cosmetic industries. These attacks
involved emails that contained Microsoft Office document attachments designed to lure victims and exploit a
Microsoft Office vulnerability, tracked as CVE-2017-11882, which allows attackers to run arbitrary code in the
context of the current user. The malicious documents contained what is purported to be an advisory on the
impact of the virus on the shipping industry. Once the malicious document is opened, it installs the
information-stealing malware “AZORult.” The AZORult strain observed in the campaign did not download
ransomware, as it has done in previous attacks. According to researchers at Proofpoint, the malicious emails
are originating from groups in Russia and Eastern Europe. (
• Kaspersky published an article about phishing emails that emulated the CDC, in particular from emails
containing the domains cdc-gov[.]org and cdcgov[.]org. In one instance, the URL contained within a phishing
email led to a fake Microsoft Outlook login page, designed to convince victims to input their credentials. In
another instance, victims were asked to donate Bitcoin to the CDC to aid in the pursuit of a vaccine.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
WHY YOU WILL BE IN DEMAND: LEADERS NEED YOU
• Threat intelligence market will move from USD 5.3 billion in 2018 to USD 12.9 billion by
2023. Dice lists over 29,000 Cyber Security Intelligence Analyst jobs.
• Cyber threat intelligence provides proper visibility into such emerging security hazards
to reduce the risk of information loss, minimize or block disruption in business
operations, and maximize regulatory consent. Its your Cyber Weather Forecast
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
RECORDED WEBINAR VIDEO
To watch the recorded webinar video for live demos, please access the link:
http://tiny.cc/2yiklz
| |
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
ABOUT NETCOM LEARNING
NetCom Learningis an award-winning
global leader in managedlearning
services, training and talentdevelopment.
Founded : 1998
Headquarters : NewYorkCity
Delivery Capability : Worldwide
CEO : RussellSarder
90,000+
Professionals
trained
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
10,000+
Corporate
clients
1500+
IT,Business&
Soft Skillscourses
96%
Of customers
recommend usto others
8.6/9
Instructor
evaluations
20+
Leadingvendors
recognitions
Microsoft’s
Worldwidetraining
partner ofthe year
80%
Trainedofthe
Fortune100
Top20
ITTraining
Company
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
RECOMMENDED COURSES AND MARKETING ASSETS
NetCom Learning offers a comprehensive portfolio for Security Courses
» COMPTIA SECURITY+ CERTIFICATION PREP (EXAM SY0-501) –Class Scheduled onApr 06
» IMPLEMENTING CISCO CYBERSECURITY OPERATIONS (SECOPS) V1.0 (ASSOCIATE) –Class Scheduled onApr 06
» CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) – Class Scheduled on Apr20
»COMPTIA CYBERSECURITY ANALYST (CYSA+) –Class Scheduled onApr 27
»UNDERSTANDINGCISCOCYBERSECURITYFUNDAMENTALS(SECFND)V1.0(ASSOCIATE)–Class Scheduled onApr27
» COMPTIA SECURITY+ ELEARNING
»IMPLEMENTINGCISCOCYBERSECURITYOPERATIONS(SECOPS)V1.0(ASSOCIATE)ELEARNING
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
You can also access the below Marketing Assets
» Free On-Demand Training – Explore the Ways to Navigate Your Career in Cybersecurity
» Free On-Demand Training- The Five "Hows": How Cybersecurity Helps Drive Business Agility
» Blog - Top Data Breaches in the 21st Century and Ways to Overcome Them
» Blog - CompTIA Security+ Certification For Enterprise Network Security: Advantages
» Free Assessment Quiz - CompTIA Security+ Certification Prep (Exam SY0-501) Quiz
» Free Assessment Quiz - Certified Information Systems Security Professional (CISSP) Certification Prep Quiz
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
UPCOMING WEBINARS
• Why your Organization needs to Migrate on Microsoft Teams
• Learn How to Deploy Microsoft SQL in the Cloud
• Creating a Windows Virtual Machine in Microsoft Azure
• How to Pass the Project Management Professional (PMP®) Exam, 6th Edition
• Citrix Workspace: How to Architecture Microapps
• 5 Steps to Master Microsoft Excel: Workbooks
• Cisco Professionals: How to Add API Skills to Your Networking Toolbox
& More
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
FOLLOWUS ON
LinkedIn Twitter YouTube
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
Instagram
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
BUILDING AN INNOVATIVE LEARNING ORG.
A NEW BOOK FROM RUSSELL
SARDER, CEO AT NETCOM
LEARNING
Aframework to build a smarter
workforce, adapt to change and
drive growth.
DOWNLOADe-book
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
Thankyou
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||| |© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||

Weitere ähnliche Inhalte

Was ist angesagt?

The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
Amazon Web Services
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 

Was ist angesagt? (20)

Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
 
GFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetGFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business Datasheet
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Take Down
Take DownTake Down
Take Down
 
Data Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicData Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus Pandemic
 

Ähnlich wie Webinar - How to Become a Cyber-threat Intelligence Analyst

symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
finance40
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
Harry Gunns
 

Ähnlich wie Webinar - How to Become a Cyber-threat Intelligence Analyst (20)

Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape... Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 
Design a strong defense strategy to prevent hackers from evading antivirus so...
Design a strong defense strategy to prevent hackers from evading antivirus so...Design a strong defense strategy to prevent hackers from evading antivirus so...
Design a strong defense strategy to prevent hackers from evading antivirus so...
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
 
SMACIC_Clean
SMACIC_CleanSMACIC_Clean
SMACIC_Clean
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
 
RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
 

Mehr von Tuan Yang

Mehr von Tuan Yang (20)

Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfLearn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdf
 
Defense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfDefense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdf
 
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfCybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
 
An Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdfAn Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdf
 
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
 
What is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfWhat is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdf
 
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdfWhat is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
 
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfAgile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
 
Getting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdfGetting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdf
 
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfCertified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdf
 
An overview of agile methods and agile project management
An overview of agile methods and agile project management An overview of agile methods and agile project management
An overview of agile methods and agile project management
 
The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)
 
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
 
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsCHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
 
Master Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSMaster Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWS
 
How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.
 
Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...
 
NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...
 
NetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freNetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender fre
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Webinar - How to Become a Cyber-threat Intelligence Analyst

  • 1. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| How to Become a Cyber-threat Intelligence Analyst Frank Satterwhite NetCom Learning
  • 2. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| AGENDA What is a Threat Intelligence Analyst? Skills Needed to Become a Threat Intelligence Analyst Sample Threat Intelligence Report Why You Will Be In Demand: Leaders Need You
  • 3. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
  • 4. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| WHAT IS A THREAT INTELLIGENCE ANALYST? A WEATHER MAN • Helps an Organization understand its assets, infrastructure, personnel and business operations • Within the context of the business, identifies opportunities to malicious actors. • Identifies potential vulnerabilities and helps business operations prepare accordingly.
  • 5. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| SKILLS NEEDED TO BECOME A THREAT INTELLIGENCE ANALYST The Biggest Requirement is to be SMART! Cyber threat analysts apply scientific and technical knowledge to solving complex intelligence problems. Threat Analyst must be able to take initiative, be creative, and have analytical skills. A Common Profile: 1. Undergraduate and preferably graduate degree in Computer Science or Information Security related field. 2. IT Security Certfications conveying both technical and theoritical understanding 3. Familiarity with Open Source Intelligence Tools (OSINT) a. Ability to Collect and Analyze Indicators of Compromise b. Conduct All-Source Analysis 4. Support Digital Forensics
  • 6. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| SAMPLE THREAT INTELLIGENCE REPORT • 1. Executive Summary • 2. Key findings • 3. Background • 4. Covid-19 Attacks • 5. IOCs for the campaigns are provided somewhere in the report, usually in the appendix.
  • 7. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| INCIDENT SUMMARY TAKEN FROM RECORDING FUTURES REPORTING: • The AZORuIt malware was observed being delivered by phishing documents that used COVID-19 as a lure in early February 2020. Researchers at Proofpoint observed a COVID-19-themed phishing campaign targeting the manufacturing, industrial, finance, transportation, pharmaceutical, and cosmetic industries. These attacks involved emails that contained Microsoft Office document attachments designed to lure victims and exploit a Microsoft Office vulnerability, tracked as CVE-2017-11882, which allows attackers to run arbitrary code in the context of the current user. The malicious documents contained what is purported to be an advisory on the impact of the virus on the shipping industry. Once the malicious document is opened, it installs the information-stealing malware “AZORult.” The AZORult strain observed in the campaign did not download ransomware, as it has done in previous attacks. According to researchers at Proofpoint, the malicious emails are originating from groups in Russia and Eastern Europe. ( • Kaspersky published an article about phishing emails that emulated the CDC, in particular from emails containing the domains cdc-gov[.]org and cdcgov[.]org. In one instance, the URL contained within a phishing email led to a fake Microsoft Outlook login page, designed to convince victims to input their credentials. In another instance, victims were asked to donate Bitcoin to the CDC to aid in the pursuit of a vaccine.
  • 8. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| WHY YOU WILL BE IN DEMAND: LEADERS NEED YOU • Threat intelligence market will move from USD 5.3 billion in 2018 to USD 12.9 billion by 2023. Dice lists over 29,000 Cyber Security Intelligence Analyst jobs. • Cyber threat intelligence provides proper visibility into such emerging security hazards to reduce the risk of information loss, minimize or block disruption in business operations, and maximize regulatory consent. Its your Cyber Weather Forecast
  • 9. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| RECORDED WEBINAR VIDEO To watch the recorded webinar video for live demos, please access the link: http://tiny.cc/2yiklz | |
  • 10. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| ABOUT NETCOM LEARNING NetCom Learningis an award-winning global leader in managedlearning services, training and talentdevelopment. Founded : 1998 Headquarters : NewYorkCity Delivery Capability : Worldwide CEO : RussellSarder 90,000+ Professionals trained | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 10,000+ Corporate clients 1500+ IT,Business& Soft Skillscourses 96% Of customers recommend usto others 8.6/9 Instructor evaluations 20+ Leadingvendors recognitions Microsoft’s Worldwidetraining partner ofthe year 80% Trainedofthe Fortune100 Top20 ITTraining Company © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
  • 11. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| RECOMMENDED COURSES AND MARKETING ASSETS NetCom Learning offers a comprehensive portfolio for Security Courses » COMPTIA SECURITY+ CERTIFICATION PREP (EXAM SY0-501) –Class Scheduled onApr 06 » IMPLEMENTING CISCO CYBERSECURITY OPERATIONS (SECOPS) V1.0 (ASSOCIATE) –Class Scheduled onApr 06 » CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) – Class Scheduled on Apr20 »COMPTIA CYBERSECURITY ANALYST (CYSA+) –Class Scheduled onApr 27 »UNDERSTANDINGCISCOCYBERSECURITYFUNDAMENTALS(SECFND)V1.0(ASSOCIATE)–Class Scheduled onApr27 » COMPTIA SECURITY+ ELEARNING »IMPLEMENTINGCISCOCYBERSECURITYOPERATIONS(SECOPS)V1.0(ASSOCIATE)ELEARNING | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| You can also access the below Marketing Assets » Free On-Demand Training – Explore the Ways to Navigate Your Career in Cybersecurity » Free On-Demand Training- The Five "Hows": How Cybersecurity Helps Drive Business Agility » Blog - Top Data Breaches in the 21st Century and Ways to Overcome Them » Blog - CompTIA Security+ Certification For Enterprise Network Security: Advantages » Free Assessment Quiz - CompTIA Security+ Certification Prep (Exam SY0-501) Quiz » Free Assessment Quiz - Certified Information Systems Security Professional (CISSP) Certification Prep Quiz
  • 12. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| UPCOMING WEBINARS • Why your Organization needs to Migrate on Microsoft Teams • Learn How to Deploy Microsoft SQL in the Cloud • Creating a Windows Virtual Machine in Microsoft Azure • How to Pass the Project Management Professional (PMP®) Exam, 6th Edition • Citrix Workspace: How to Architecture Microapps • 5 Steps to Master Microsoft Excel: Workbooks • Cisco Professionals: How to Add API Skills to Your Networking Toolbox & More | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
  • 13. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| FOLLOWUS ON LinkedIn Twitter YouTube | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 Instagram © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
  • 14. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| BUILDING AN INNOVATIVE LEARNING ORG. A NEW BOOK FROM RUSSELL SARDER, CEO AT NETCOM LEARNING Aframework to build a smarter workforce, adapt to change and drive growth. DOWNLOADe-book | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
  • 15. Thankyou © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||| |© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||