Certified Cyber Threat Intelligence Analyst

  • Passive DNS & Internet Port Scan Part 1 
    • Phase Overview
    • Threat Intelligence Researcher Course
    • Phases Overview Part 1
    • Phases Overview Part 2
    • Phases Overview Part 3
    • Hunting Part 1
    • Hunting Part 2
    • Features Extraction Part 1
    • Features Extraction Part 2
    • Behavior Extraction Part 1
    • Behavior Extraction Part 2
    • Behavior Extraction Part 3
    • Clustering and Correlation
    • Threat Actor Attribution Part 1
    • Threat Actor Attribution Part 2
    • Tracking
    • Taking Down
    • Hunting
    • VirusTotal Part 1
    • VirusTotal Part 2
    • Hacking Forums Part 1
    • Hacking Forums Part 2
    • Hacking Forums Part 3
    • DeepWeb Part 1
    • DeepWeb Part 2
    • Honeypot and OSINT
    • VirusTotal Intelligence
    • Binary-Level Detection with Yara
    • Features Extraction
    • Features Extraction Goal Part 1
    • Features Extraction Goal Part 2
    • Import Table Hash (imphash) Part 1
    • Import Table Hash (imphash) Part 2
    • Fuzzy Hash (ssdeep)
    • Strings
    • Extracting VBA Macros with Didier Stevens Tools
    • Lab C2 IP Pivoting
    • Behavior Extraction
    • Dynamic Indicators Part 1
    • Dynamic Indicators Part 2
    • Dynamic Indicators Part 3
    • Dynamic Indicators Part 4
    • Process Infector and Keyloggers
    • Passive DNS (DNSDB) Part 1
    • Passive DNS (DNSDB) Part 2
    • Clustering & Correlation
    • How Clustering & Correlation Works Part 1
    • How Clustering & Correlation Works Part 2
    • How Clustering & Correlation Works Part 3
    • How Clustering & Correlation Works Part 4
    • GraphDB Part 1
    • GraphDB Part 2
    • Attribution
    • Where are they Located? Part 1
    • Where are they Located? Part 2
    • Who are the Targets?
    • Initial Compromise
    • Privilege Escalation
    • Persistence
    • Lateral Movement Part 1
    • Lateral Movement Part 2
    • Exfiltration Strategy
    • Profiling the Attacker
    • Tracking
    • Passive DNS & Internet Port Scan Part 1
    • Passive DNS & Internet Port Scan Part 2
    • Passive DNS & Internet Port Scan Part 3
    • Passive DNS & Internet Port Scan Part 4
    • Lookups, OSINT, and Hacking Forums Part 1
    • Lookups, OSINT, and Hacking Forums Part 2
    • Taking Down
    • Sinkhole Part 1
    • Sinkhole Part 2
    • How it works? Part 1
    • How it works? Part 2
    • Hacking Forums
    • Victims Notification
  • Course info
×

Course info

Certified Cyber Threat Intelligence Analyst

Continue To Order: https://ethicalhackersacademy.com/collec...

Content
  • Phase Overview
  • Threat Intelligence Researcher Course  sample
  • Phases Overview Part 1
  • Phases Overview Part 2
  • Phases Overview Part 3
  • Hunting Part 1
  • Hunting Part 2
  • Features Extraction Part 1
  • Features Extraction Part 2
  • Behavior Extraction Part 1
  • Behavior Extraction Part 2
  • Behavior Extraction Part 3
  • Clustering and Correlation
  • Threat Actor Attribution Part 1
  • Threat Actor Attribution Part 2
  • Tracking
  • Taking Down
  • Hunting
  • VirusTotal Part 1
  • VirusTotal Part 2
  • Hacking Forums Part 1
  • Hacking Forums Part 2
  • Hacking Forums Part 3
  • DeepWeb Part 1
  • DeepWeb Part 2 sample
  • Honeypot and OSINT
  • VirusTotal Intelligence
  • Binary-Level Detection with Yara
  • Features Extraction
  • Features Extraction Goal Part 1
  • Features Extraction Goal Part 2
  • Import Table Hash (imphash) Part 1 sample
  • Import Table Hash (imphash) Part 2
  • Fuzzy Hash (ssdeep)
  • Strings
  • Extracting VBA Macros with Didier Stevens Tools sample
  • Lab C2 IP Pivoting
  • Behavior Extraction
  • Dynamic Indicators Part 1 sample
  • Dynamic Indicators Part 2
  • Dynamic Indicators Part 3
  • Dynamic Indicators Part 4
  • Process Infector and Keyloggers
  • Passive DNS (DNSDB) Part 1
  • Passive DNS (DNSDB) Part 2
  • Clustering & Correlation
  • How Clustering & Correlation Works Part 1 sample
  • How Clustering & Correlation Works Part 2
  • How Clustering & Correlation Works Part 3
  • How Clustering & Correlation Works Part 4
  • GraphDB Part 1
  • GraphDB Part 2
  • Attribution
  • Where are they Located? Part 1 sample
  • Where are they Located? Part 2
  • Who are the Targets?
  • Initial Compromise
  • Privilege Escalation
  • Persistence
  • Lateral Movement Part 1
  • Lateral Movement Part 2
  • Exfiltration Strategy
  • Profiling the Attacker
  • Tracking
  • Passive DNS & Internet Port Scan Part 1 sample
  • Passive DNS & Internet Port Scan Part 2
  • Passive DNS & Internet Port Scan Part 3
  • Passive DNS & Internet Port Scan Part 4
  • Lookups, OSINT, and Hacking Forums Part 1
  • Lookups, OSINT, and Hacking Forums Part 2
  • Taking Down
  • Sinkhole Part 1 sample
  • Sinkhole Part 2
  • How it works? Part 1
  • How it works? Part 2
  • Hacking Forums
  • Victims Notification
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: Forever
Close
×

Congratulations!

Course completed!

Course completed!

Download certificate

Continue

Go to next course

×

Notice

 Delete  Delete, don't keep asking Cancel
×

Notice

 Delete Cancel
×

Notice

 Discard changes Cancel