From the course: Advanced Cyber Threat Intelligence
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Internal data acquisition
From the course: Advanced Cyber Threat Intelligence
Internal data acquisition
- [Alyssa] Hello, and welcome to the second lesson of the first module, Data Collection. This video is about internal data acquisition. This video is fully dedicated to explain the different categories of internal data sources. Before thinking of gathering data or information from external sources, it is wise to think about getting the most out of your available raw crystals, or should I say, your IT environment or IT infrastructure. There are literally hundreds of possible types of data sources around your environment. By leveraging threat data from your own network, you can detect and stop threats. In these cases, you need to know that understanding all the log types and sources available for selection can be pretty difficult, and there is no way we could every think to cover every possible source of logs. This is why we need to identify what may be more valuable than others as a start point, and we can always add…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Introduction to data collection4m 11s
-
(Locked)
Internal data acquisition6m 38s
-
(Locked)
External data sources7m 7s
-
(Locked)
Private data sources part 18m 37s
-
(Locked)
Private data sources part 23m 42s
-
(Locked)
Community data sources10m 48s
-
(Locked)
Public data sources part 18m
-
(Locked)
Public data sources part 23m 12s
-
(Locked)
Leveraging OSINT part 19m 22s
-
(Locked)
Leveraging OSINT part 26m 50s
-
-
-
-
-
-
-