Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Why and How to Take the GCTI The Industry’s Cyber Threat Intelligence Certification

Автор: SANS Digital Forensics and Incident Response

Загружено: 2018-02-21

Просмотров: 6493

Описание:

GIAC has launched the industry standard for certification of cyber threat intelligence skills called GCTI. The GCTI cert accompanies the SANS FOR578: Cyber Threat Intelligence course and focuses on codifying skills related to investigations and analyzing complex adversary intrusions and campaigns.

In this webcast, FOR578 course author Robert M Lee goes through what to expect on the GCTI, who the cert is designed for, and focus areas to help successfully pass the certification.

To learn more about the FOR578: Cyber Threat Intelligence course visit http://www.sans.org/FOR578

Robert M. Lee @RobertMLee is the CEO and Founder of the industrial (ICS/IIoT) cyber security company Dragos, Inc. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of Passcode's Influencers, awarded EnergySec's Cyber Security Professional of the Year (2015), and inducted into Forbes' 30 under 30 for Enterprise Technology (2016).

A passionate educator, Robert is the course author of SANS ICS515 - "ICS Active Defense and Incident Response" with its accompanying GIAC certification GRID and the lead-author of SANS FOR578 - "Cyber Threat Intelligence" with its accompanying GIAC GCTI certification. He may be found on Twitter @RobertMLee

Why and How to Take the GCTI   The Industry’s Cyber Threat Intelligence Certification

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(20) { ["ai_7Fkv6igw"]=> object(stdClass)#7620 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "ai_7Fkv6igw" ["related_video_title"]=> string(62) "Getting Started with the SIFT Workstation Webcast with Rob Lee" ["posted_time"]=> string(19) "8 лет назад" ["channelName"]=> NULL } ["J7e74QLVxCk"]=> object(stdClass)#7635 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "J7e74QLVxCk" ["related_video_title"]=> string(38) "The Cycle of Cyber Threat Intelligence" ["posted_time"]=> string(19) "6 лет назад" ["channelName"]=> NULL } ["lq-0zQh4oVs"]=> object(stdClass)#7621 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "lq-0zQh4oVs" ["related_video_title"]=> string(34) "Cyber Threat Intelligence Workshop" ["posted_time"]=> string(27) "7 месяцев назад" ["channelName"]=> NULL } ["borfuQGrB8g"]=> object(stdClass)#7618 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "borfuQGrB8g" ["related_video_title"]=> string(52) "Keynote: Cobalt Strike Threat Hunting | Chad Tilbury" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> NULL } ["bkfwMADar0M"]=> object(stdClass)#7613 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "bkfwMADar0M" ["related_video_title"]=> string(96) "Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels" ["posted_time"]=> string(19) "6 лет назад" ["channelName"]=> NULL } ["fvYb5-NxoDc"]=> object(stdClass)#7631 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "fvYb5-NxoDc" ["related_video_title"]=> string(45) "Job Role Spotlight: Cyber Threat Intelligence" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> NULL } ["HrYvM4-ZA_Q"]=> object(stdClass)#7610 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "HrYvM4-ZA_Q" ["related_video_title"]=> string(114) "Использование OSINT для отслеживания лиц, создающих киберугрозы" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> NULL } ["QI7oUwNrQ34"]=> object(stdClass)#7630 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "QI7oUwNrQ34" ["related_video_title"]=> string(86) "Цепи Маркова — математика предсказаний [Veritasium]" ["posted_time"]=> string(23) "1 месяц назад" ["channelName"]=> NULL } ["1BBw9GO7g74"]=> object(stdClass)#7615 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "1BBw9GO7g74" ["related_video_title"]=> string(93) "Understanding & Managing Collection to Support Threat Intelligence Analysis - SANS CTI Summit" ["posted_time"]=> string(19) "5 лет назад" ["channelName"]=> NULL } ["uqodfL0e1uU"]=> object(stdClass)#7633 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "uqodfL0e1uU" ["related_video_title"]=> string(90) "What is Certified Threat Intelligence Analyst (CTIA)? | Importance of Threat Intelligence" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> NULL } ["oe8JfGg_1n8"]=> object(stdClass)#7609 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "oe8JfGg_1n8" ["related_video_title"]=> string(62) "How To Pass a SANS Cyber Security Exam in 5 DAYS (No books…)" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> NULL } ["7aemGhaE9ds"]=> object(stdClass)#7619 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "7aemGhaE9ds" ["related_video_title"]=> string(58) "Inside the Persistent Mind of a Chinese Nation-State Actor" ["posted_time"]=> string(21) "3 года назад" ["channelName"]=> NULL } ["gqsE2coucjg"]=> object(stdClass)#7614 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "gqsE2coucjg" ["related_video_title"]=> string(86) "Threat Intel for Everyone: Writing Like A Journalist To Produce Clear, Concise Reports" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> NULL } ["GqmQg-cszw4"]=> object(stdClass)#7611 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "GqmQg-cszw4" ["related_video_title"]=> string(30) "1. Introduction, Threat Models" ["posted_time"]=> string(20) "10 лет назад" ["channelName"]=> NULL } ["zDexGxVrBBM"]=> object(stdClass)#7612 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "zDexGxVrBBM" ["related_video_title"]=> string(94) "Как общаться по-настоящему БЕЗОПАСНО | Первый отдел" ["posted_time"]=> string(23) "1 месяц назад" ["channelName"]=> NULL } ["VNrFzPUxUyk"]=> object(stdClass)#7600 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "VNrFzPUxUyk" ["related_video_title"]=> string(89) "Cyber threat intelligence: Learn to become a cybersecurity tactician | Cyber Work Podcast" ["posted_time"]=> string(19) "5 лет назад" ["channelName"]=> NULL } ["tWHqHy-MC1U"]=> object(stdClass)#7601 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "tWHqHy-MC1U" ["related_video_title"]=> string(75) "You MUST understand Cyber Threat Intelligence to Blue Team w/Samuel Kimmons" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> NULL } ["Xw536W7kbDQ"]=> object(stdClass)#7607 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "Xw536W7kbDQ" ["related_video_title"]=> string(56) "SANS DFIR Webcast - Incident Response Event Log Analysis" ["posted_time"]=> string(20) "10 лет назад" ["channelName"]=> NULL } ["_wVqV3cNx70"]=> object(stdClass)#7608 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "_wVqV3cNx70" ["related_video_title"]=> string(48) "Threat Intelligence, Practically: A Walk through" ["posted_time"]=> string(19) "7 лет назад" ["channelName"]=> NULL } ["7xZIZnMUbZU"]=> object(stdClass)#7606 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "7xZIZnMUbZU" ["related_video_title"]=> string(160) "АДВОКАТ: Как помешать полицейским использовать эту новую технологию для слежки за вами" ["posted_time"]=> string(25) "2 недели назад" ["channelName"]=> NULL } }
Getting Started with the SIFT Workstation Webcast with Rob Lee

Getting Started with the SIFT Workstation Webcast with Rob Lee

The Cycle of Cyber Threat Intelligence

The Cycle of Cyber Threat Intelligence

Cyber Threat Intelligence Workshop

Cyber Threat Intelligence Workshop

Keynote: Cobalt Strike Threat Hunting | Chad Tilbury

Keynote: Cobalt Strike Threat Hunting | Chad Tilbury

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

Job Role Spotlight: Cyber Threat Intelligence

Job Role Spotlight: Cyber Threat Intelligence

Использование OSINT для отслеживания лиц, создающих киберугрозы

Использование OSINT для отслеживания лиц, создающих киберугрозы

Цепи Маркова — математика предсказаний [Veritasium]

Цепи Маркова — математика предсказаний [Veritasium]

Understanding & Managing Collection to Support Threat Intelligence Analysis - SANS CTI Summit

Understanding & Managing Collection to Support Threat Intelligence Analysis - SANS CTI Summit

What is Certified Threat Intelligence Analyst (CTIA)? |  Importance of Threat Intelligence

What is Certified Threat Intelligence Analyst (CTIA)? | Importance of Threat Intelligence

How To Pass a SANS Cyber Security Exam in 5 DAYS (No books…)

How To Pass a SANS Cyber Security Exam in 5 DAYS (No books…)

Inside the Persistent Mind of a Chinese Nation-State Actor

Inside the Persistent Mind of a Chinese Nation-State Actor

Threat Intel for Everyone: Writing Like A Journalist To Produce Clear, Concise Reports

Threat Intel for Everyone: Writing Like A Journalist To Produce Clear, Concise Reports

1. Introduction, Threat Models

1. Introduction, Threat Models

Как общаться по-настоящему БЕЗОПАСНО | Первый отдел

Как общаться по-настоящему БЕЗОПАСНО | Первый отдел

Cyber threat intelligence: Learn to become a cybersecurity tactician | Cyber Work Podcast

Cyber threat intelligence: Learn to become a cybersecurity tactician | Cyber Work Podcast

You MUST understand Cyber Threat Intelligence to Blue Team w/Samuel Kimmons

You MUST understand Cyber Threat Intelligence to Blue Team w/Samuel Kimmons

SANS DFIR Webcast - Incident Response Event Log Analysis

SANS DFIR Webcast - Incident Response Event Log Analysis

Threat Intelligence, Practically: A Walk through

Threat Intelligence, Practically: A Walk through

АДВОКАТ: Как помешать полицейским использовать эту новую технологию для слежки за вами

АДВОКАТ: Как помешать полицейским использовать эту новую технологию для слежки за вами

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]