Introduction
How to manage security threats
()
What you need to know
()
1. Overview of the Role of a Cybersecurity Analyst
The goals of information security
()
Role of the cybersecurity analyst
()
2. Understanding the Cybersecurity Threat
Threat actors
()
Zero-days and the APT
()
Threat classification
()
3. Threat Intelligence
Threat intelligence
()
Intelligence cycle
()
Managing threat indicators
()
Intelligence sharing
()
4. Threat Modeling
Threat research
()
Identifying threats
()
Understanding attacks
()
Threat modeling
()
Threat hunting
()
5. Attack Frameworks
MITRE ATT&CK
()
Diamond Model of Intrusion Analysis
()
Cyber kill chain analysis
()
6. Malware Threats
Comparing viruses, worms, and Trojans
()
Looking at advanced malware
()
Understanding botnets
()
Comparing adware, spyware, and ransomware
()
Understanding backdoors and logic bombs
()
7. Environmental Reconnaissance
Social engineering
()
DNS harvesting
()
Network mapping
()
Enumeration tools
()
Protocol analyzers
()
Wireless reconnaissance
()
The importance of perspective
()
8. Cloud Security
What is the cloud?
()
Cloud activities and the cloud reference architecture
()
Cloud deployment models
()
Public cloud tiers
()
DevOps
()
Cloud security risks
()
Conclusion
What's next
()