• Online, Self-Paced
Course Description

Cyber attribution analysis is used to track, identify, and incriminate perpetrators of cyber attacks or exploits and is a must-know offensive security operations technique. In this course, you'll learn about the fundamental concepts and critical concerns related to attribution.

You'll start by examining the different attribution types and levels before exploring attribution indicators, techniques, best practices, tools, and challenges.

Moving on, you'll gain insight into how to identify and interpret forensic artifacts gathered from various sources, manage evidence, and make attribution judgments and assessments. You'll then study geopolitics, the Intelligence Community, and legal considerations as they relate to cyber threats and attribution. Lastly, you'll look into how malware cyber threat reverse engineering, code sharing analysis, and network behavior analysis lead to attribution.

Learning Objectives

{"discover the key concepts covered in this course"}

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • All-Source Analysis
  • Cyber Operational Planning
  • Cyber Operations
  • Cyber Defense Analysis
  • Cybersecurity Management
  • Digital Forensics
  • Executive Cyber Leadership
  • Systems Analysis
  • Systems Development
  • Threat Analysis
  • Vulnerability Assessment and Management