(Workshop) Adversarial Mapping for Cyber Threat Intelligence

Create an adversary map to track a threat actor's infrastructure and understand their attack flow. This will help with attribution and detection engineering as you learn to filter through the noise and prioritize what's actionable.
Product image for (Workshop) Adversarial Mapping for Cyber Threat Intelligence

Course content

2 sections | 4 lessons