GIAC has launched the industry standard for certification of cyber threat intelligence skills called GCTI. The GCTI cert accompanies the SANS FOR578: Cyber Threat Intelligence course and focuses on codifying skills related to investigations and analyzing complex adversary intrusions and campaigns.
In this webcast, FOR578 course author Robert M Lee goes through what to expect on the GCTI, who the cert is designed for, and focus areas to help successfully pass the certification.
To learn more about the FOR578: Cyber Threat Intelligence course visit http://www.sans.org/FOR578
Robert M. Lee @RobertMLee is the CEO and Founder of the industrial (ICS/IIoT) cyber security company Dragos, Inc. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of Passcode's Influencers, awarded EnergySec's Cyber Security Professional of the Year (2015), and inducted into Forbes' 30 under 30 for Enterprise Technology (2016).
A passionate educator, Robert is the course author of SANS ICS515 - "ICS Active Defense and Incident Response" with its accompanying GIAC certification GRID and the lead-author of SANS FOR578 - "Cyber Threat Intelligence" with its accompanying GIAC GCTI certification. He may be found on Twitter @RobertMLee
Поделиться в:
Доступные форматы для скачивания:
Скачать видео mp4
Информация по загрузке:
Скачать аудио mp3
Похожие видео
array(20) {
["ai_7Fkv6igw"]=>
object(stdClass)#7620 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "ai_7Fkv6igw"
["related_video_title"]=>
string(62) "Getting Started with the SIFT Workstation Webcast with Rob Lee"
["posted_time"]=>
string(19) "8 лет назад"
["channelName"]=>
NULL
}
["J7e74QLVxCk"]=>
object(stdClass)#7635 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "J7e74QLVxCk"
["related_video_title"]=>
string(38) "The Cycle of Cyber Threat Intelligence"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
NULL
}
["lq-0zQh4oVs"]=>
object(stdClass)#7621 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "lq-0zQh4oVs"
["related_video_title"]=>
string(34) "Cyber Threat Intelligence Workshop"
["posted_time"]=>
string(27) "7 месяцев назад"
["channelName"]=>
NULL
}
["borfuQGrB8g"]=>
object(stdClass)#7618 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "borfuQGrB8g"
["related_video_title"]=>
string(52) "Keynote: Cobalt Strike Threat Hunting | Chad Tilbury"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["bkfwMADar0M"]=>
object(stdClass)#7613 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "bkfwMADar0M"
["related_video_title"]=>
string(96) "Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
NULL
}
["fvYb5-NxoDc"]=>
object(stdClass)#7631 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "fvYb5-NxoDc"
["related_video_title"]=>
string(45) "Job Role Spotlight: Cyber Threat Intelligence"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["HrYvM4-ZA_Q"]=>
object(stdClass)#7610 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "HrYvM4-ZA_Q"
["related_video_title"]=>
string(114) "Использование OSINT для отслеживания лиц, создающих киберугрозы"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["QI7oUwNrQ34"]=>
object(stdClass)#7630 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "QI7oUwNrQ34"
["related_video_title"]=>
string(86) "Цепи Маркова — математика предсказаний [Veritasium]"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
NULL
}
["1BBw9GO7g74"]=>
object(stdClass)#7615 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "1BBw9GO7g74"
["related_video_title"]=>
string(93) "Understanding & Managing Collection to Support Threat Intelligence Analysis - SANS CTI Summit"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
NULL
}
["uqodfL0e1uU"]=>
object(stdClass)#7633 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "uqodfL0e1uU"
["related_video_title"]=>
string(90) "What is Certified Threat Intelligence Analyst (CTIA)? | Importance of Threat Intelligence"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["oe8JfGg_1n8"]=>
object(stdClass)#7609 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "oe8JfGg_1n8"
["related_video_title"]=>
string(62) "How To Pass a SANS Cyber Security Exam in 5 DAYS (No books…)"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["7aemGhaE9ds"]=>
object(stdClass)#7619 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7aemGhaE9ds"
["related_video_title"]=>
string(58) "Inside the Persistent Mind of a Chinese Nation-State Actor"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
NULL
}
["gqsE2coucjg"]=>
object(stdClass)#7614 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "gqsE2coucjg"
["related_video_title"]=>
string(86) "Threat Intel for Everyone: Writing Like A Journalist To Produce Clear, Concise Reports"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["GqmQg-cszw4"]=>
object(stdClass)#7611 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "GqmQg-cszw4"
["related_video_title"]=>
string(30) "1. Introduction, Threat Models"
["posted_time"]=>
string(20) "10 лет назад"
["channelName"]=>
NULL
}
["zDexGxVrBBM"]=>
object(stdClass)#7612 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "zDexGxVrBBM"
["related_video_title"]=>
string(94) "Как общаться по-настоящему БЕЗОПАСНО | Первый отдел"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
NULL
}
["VNrFzPUxUyk"]=>
object(stdClass)#7600 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "VNrFzPUxUyk"
["related_video_title"]=>
string(89) "Cyber threat intelligence: Learn to become a cybersecurity tactician | Cyber Work Podcast"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
NULL
}
["tWHqHy-MC1U"]=>
object(stdClass)#7601 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "tWHqHy-MC1U"
["related_video_title"]=>
string(75) "You MUST understand Cyber Threat Intelligence to Blue Team w/Samuel Kimmons"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["Xw536W7kbDQ"]=>
object(stdClass)#7607 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Xw536W7kbDQ"
["related_video_title"]=>
string(56) "SANS DFIR Webcast - Incident Response Event Log Analysis"
["posted_time"]=>
string(20) "10 лет назад"
["channelName"]=>
NULL
}
["_wVqV3cNx70"]=>
object(stdClass)#7608 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "_wVqV3cNx70"
["related_video_title"]=>
string(48) "Threat Intelligence, Practically: A Walk through"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
NULL
}
["7xZIZnMUbZU"]=>
object(stdClass)#7606 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7xZIZnMUbZU"
["related_video_title"]=>
string(160) "АДВОКАТ: Как помешать полицейским использовать эту новую технологию для слежки за вами"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
NULL
}
}