Phases Overview
  • Threat Intelligence Researcher Course Intro
  • Phases Overview Part 1
  • Phases Overview Part 2
  • Phases Overview Part 3
  • Hunting Part 1
  • Hunting Part 2
  • Features Extraction Part 1
  • Features Extraction Part 2
  • Behavior Extraction Part 1
  • Behavior Extraction Part 2
  • Behavior Extraction Part 3
  • Clustering and Correlation
  • Threat Actor Attribution Part 1
  • Threat Actor Attribution Part 2
  • Tracking
  • Taking Down
  • Threat Intelligence Overview
Hunting
  • VirusTotal Part 1
  • VirusTotal Part 2
  • Hacking Forums Part 1
  • Hacking Forums Part 2
  • Hacking Forums Part 3
  • DeepWeb Part 1
  • DeepWeb Part 2
  • Honeypot and OSINT
  • Lab: VirusTotal Intelligence
  • Lab: Binary-Level Detection with Yara
  • Hunting
Features Extraction
  • Features Extraction Goal Part 1
  • Features Extraction Goal Part 2
  • Import Table Hash (imphash) Part 1
  • Import Table Hash (imphash) Part 2
  • Fuzzy Hash (ssdeep)
  • Lab: Extracting VBA Macros with Didier Stevens Tools
  • Lab: C2 IP Pivoting
  • Features Extraction
Behavior Extraction
  • Dynamic Indicators Part 1
  • Dynamic Indicators Part 2
  • Dynamic Indicators Part 3
  • Dynamic Indicators Part 4
  • Process Infector and Keyloggers
  • Passive DNS (DNSDB) Part 1
  • Passive DNS (DNSDB) Part 2
  • Behavior Extraction
Clustering & Correlation
  • How Clustering & Correlation Works Part 1
  • How Clustering & Correlation Works Part 2
  • How Clustering & Correlation Works Part 3
  • How Clustering & Correlation Works Part 4
  • GraphDB Part 1
  • GraphDB Part 2
  • LAB: Clustering & Correlation Works
  • Clustering & Correlation
Attribution
  • Where are they Located? Part 1
  • Where are they Located? Part 2
  • Who are the Targets?
  • Initial Compromise
  • Privilege Escalation
  • Persistence
  • Lateral Movement Part 1
  • Lateral Movement Part 2
  • Exfiltration Strategy
  • Profiling the Attacker
  • Attribution
Tracking
  • Passive DNS & Internet Port Scan Part 1
  • Passive DNS & Internet Port Scan Part 2
  • Passive DNS & Internet Port Scan Part 3
  • Passive DNS & Internet Port Scan Part 4
  • Lookups, OSINT, and Hacking Forums Part 1
  • Lookups, OSINT, and Hacking Forums Part 2
  • Tracking
Taking Down
  • Sinkhole Part 1
  • Sinkhole Part 2
  • How it works? Part 1
  • How it works? Part 2
  • Hacking Forums
  • Victims Notification
  • Taking Down