From the course: Advanced Cyber Threat Intelligence

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Internal data acquisition

Internal data acquisition

- [Alyssa] Hello, and welcome to the second lesson of the first module, Data Collection. This video is about internal data acquisition. This video is fully dedicated to explain the different categories of internal data sources. Before thinking of gathering data or information from external sources, it is wise to think about getting the most out of your available raw crystals, or should I say, your IT environment or IT infrastructure. There are literally hundreds of possible types of data sources around your environment. By leveraging threat data from your own network, you can detect and stop threats. In these cases, you need to know that understanding all the log types and sources available for selection can be pretty difficult, and there is no way we could every think to cover every possible source of logs. This is why we need to identify what may be more valuable than others as a start point, and we can always add…

Contents