- Type Learning
- Level Intermediate
- Time Hours
- Cost Free
Cyber Threat Workshop July 29, 2021- Adversary-Threat Infrastructure: Threat Actor Profiles and Tools
Issued by
RiskIQ
how to identify common threat actors and malicious tools used in global-scale cyber attacks. Moment by moment the internet changes. Infrastructure, apps, pages, attackers, services, third parties—and everything else on the web are dynamic. As a result, the enterprise attack surface becomes elastic, continuously evolving. Meanwhile, cybercriminals, hacktivists, and even nation-state threats all remake their tactics, techniques, and procedures (TTPs) to improve malicious capabilities.
- Type Learning
- Level Intermediate
- Time Hours
- Cost Free
Skills
Earning Criteria
-
how to identify common threat actors and malicious tools used in global-scale cyber attacks. Moment by moment the internet changes. Infrastructure, apps, pages, attackers, services, third parties—and everything else on the web are dynamic. As a result, the enterprise attack surface becomes elastic, continuously evolving. Meanwhile, cybercriminals, hacktivists, and even nation-state threats all remake their tactics, techniques, and procedures (TTPs) to improve malicious capabilities.