Open Source Intelligence for Emerging Threats

Georgia Tech Professional Education

How long?

  • 2 days
  • online

What are the topics?

Georgia Tech Professional Education

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Who should attend

This course is designed for experienced cybersecurity specialists.

About the course

Take a deep dive into how to use public sources to recognize and respond to malicious cyber activities. This course will help technical cybersecurity specialists track evolutionary and revolutionary aspects of cybersecurity threats in order to more effectively combat emerging threats. In addition, you will learn how to build and interpret threat models to assist with mitigation activities.

What You Will Learn

  • How to use publicly available sources to stay up-to-date on the latest activities in the cyber realm
  • How to triage data from diverse intelligence sources in order to prioritize and operationalize findings
  • How to extrapolate likely areas for future technique evolution
  • Methods for detecting and preventing advanced attacks from being realized within participant organizations
  • Sources for continuous information and technique discovery
  • Threat modeling

How You Will Benefit

  • Develop knowledge and skills for how to discover emerging threat tactics, techniques, and procedures.
  • Use gained intelligence to successfully identify and mitigate advanced attacks.
  • Gain a deeper understanding of at least one emerging threat as identified by Georgia Tech researchers.

Course Content

THREAT MODELING

  • Interactive lab
  • System modeling
  • Threat identification
  • Evaluation

CASE STUDY

  • Varies by offering

THREAT INTELLIGENCE

  • Where to find intelligence
  • Strategies for dealing with volume

TOOLS

  • Tools used for modeling, intel, response
  • Lab

MITIGATION STRATEGIES

  • How to prepare for an attack
  • Lab

Experts

George Macon

My name is George Macon, and I’m currently a Ph.D. student at the Georgia Institute of Technology researching computer security in the Communications Systems Center under the advisement of Dr. John Copeland. I work as a Graduate Research Assistant in the Cyber Technology and Information Security...

Adonis Bovell

Experience Company Name Georgia Tech Research Institute Total Duration 3 yrs 1 mo Senior Research Scientist Dates EmployedJul 2019 – Present Employment Duration3 mos Location Greater Atlanta Area Research Scientist II Dates EmployedSep 2016 – Jun 2019 Employment Duration2 yrs 10 mos Locat...

Open Source Intelligence for Emerging Threats at Georgia Tech Professional Education

From  $795

Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.