This course is only available to Military and Law Enforcement Agencies. This course can be customized further for specific groups needs.
Learning Objectives
Basics
Threat modeling
OSINT
Integrating forensics
Integrating logs/ SIEM
Tools
Maltego
Cybox
Open IoC
YARA
TLP
STIX
TAXII
MITRE Corporation ATT&CK model
Graph Theory for Modeling
Dark Web Investigations
Background on TOR
Overview of current markets
Case studies of web site takedowns
Step by step guide to investigations on the dark web
Zero Day Exploits