Türkiye Siber Güvenlik Kümelenmesi - Yükleniyor...

Menü

Üye Ol

Giriş Yap

Öğrenme İçeriği

• Introduction the Threat Hunting • What Motivates Cyber Attacks • What are the Cyber Attack Methods • Attacker Who Prepare Cyber Attack • Place Where Prepare Cyber Attack • Threat Hunting Fundamentals • Pyramid of Pain • TTP - Tactics, Techniques and Procedure • IOC - Indicators of Compromise • STIX - Structed Threat Information Expression • Cybox - Cyber Observable eXpression • IOC Scanners • OODA Loop • Cyber Kill Chain Model • MITRE ATT&CK Model • Fireeye Attack Lifecycle • Threat Intelligence • OSINT - Open Source Intelligence • Honeypots • Dark Web • Threat Intelligence Feed and Sharing • Strategic Cyber Threat Intelligence • Operational Cyber Threat Intelligence • Tactical Cyber Threat Intelligence • Introduction Incident Response • Incident Response Team • Incident Response Procedurs • Incident Response Example

Hedef Kitle

IT Personeli, SOME Personeli, Red Team Üyesi, Purple Team Üyesi, Güvenlik Analisti

Eğitim Detayları

Eğitim Metodu
Süre
Dil