Course Catalog
- DLP + Threat Intelligence + Cyber Crime on Accounting
- Building a Secure Environment
- Honeypots & Farming
- Threatening Metrics
- News & Public Information Analysis (also branded as NewsHawk)
- Delivering Intelligence
- Building Threat Dossiers
- Curating the Threat
- Analyzing Threat Impacts (2-day class)
- Algorithmic YARA
- YARA Phish Farm
- Prioritizing Threats (3-day class)
- YARA Architect
- Recursive YARA
- Introduction to YARA (also, YARA Basics, YARA Fundamentals, Effective YARA)
- Predicting Future Attacks (1-day, 2-day and 3-day versions)
- Identifying Unknown Packers (YARA Class)
- Introduction to Internal Collection
- Introduction to External Collection
- Introduction to TOR
- TOR & Threat Intelligence (1-day and 2-day versions)
- Attacker Target Analysis (1-day, 2-day and 3-day versions)
- MAC Defense (UXProtect/YARA) (1-day, 2-day and 3-day versions)
- File Intelligence
- Email Intelligence
- Email Analysis (2-day course, SOC/TI)
- Triage Analysis
- Data Center Analysis
- In-Deep Analysis
- Intelligence Tradecraft (2-day)
- Hunting with Virustotal (2-day)
- Analysis and Profiling (3-day Course)
- Identifying Adversary Techniques (Workshop, 1-day and 2-day versions)
- Identifying and Using Cyber Intel Metrics
- DNS Analysis (1-day, 2-day and 3-day versions)
- Blackhat SEO (1-day and 2-day versions)
- Online Threat Analysis
- Online Exchanges
- Timeline Analysis (2-day course)
- SEO for Threat Intelligence (1-day, 2-day and 3-day versions)
- Critical Thinking and Analysis (1-day, 2-day and 3-day versions)
- Four Intelligences (of Threats)
- Managing a Threat Team (4-day class)
- Principles of Investigation
- Principles of Profiling (1-day, 2-day and 3-day versions)
- Anonymous Investigation (Researching with Care)
- Hashing Techniques for Intelligence Discovery
- Pattern Recognition and Profiling (1-day, 2-day and 3-day versions)
- Risk Signals and Flags
- Fingerprints & Profiles (4-day class)
- The Right Appearance (Persona Tuning Class)
- Breach Collection & Analysis (2-day course)
- Stolen Credential Analysis (2-day course)