- Type Learning
- Level Advanced
- Time Hours
- Cost Free
Cyber Threat Workshop June 3, 2021 Vulnerabilities, Phishing, Jupyter Notebook Investigation
Issued by
RiskIQ
In this Cyber Threat Workshop, we will explore the common sources for threat intelligence and how to assemble investigation artifacts and digital forensics with hands-on exercises with RiskIQ Illuminate® Internet Intelligence Platform: Vulnerabilities - Global, Local, Supply Chain. Phishing Investigation and Advanced Jupyter Notebook Investigation.
- Type Learning
- Level Advanced
- Time Hours
- Cost Free
Skills
- Explore Third-party Attack Surfaces For An Extended Scope Of Threats
- Find And Eliminate Global Scale Attacks And Zero-day Vulnerabilities
- How To Leverage Attack Surface Intelligence For Faster Threat Investigations And Response
- Identify Adversaries By Finding Fingerprints And Threat Indicators
- Identify Risks And Vulnerabilities
- Infrastructure Chaining And Pivoting
- Internet Graphing And History
- Introduction To Datasets
- RiskIQ API
- See An Organization’s Attack Surface For Relevant Threats And Exposures
- Threat And Adversary Mapping
- Track And Expand Defenses Globally
- Uncover Suspected Cyber Attacks
Earning Criteria
-
In this Cyber Threat Workshop, we will explore the common sources for threat intelligence and how to assemble investigation artifacts and digital forensics with hands-on exercises with RiskIQ Illuminate® Internet Intelligence Platform: Vulnerabilities - Global, Local, Supply Chain. Phishing Investigation and Advanced Jupyter Notebook Investigation. 2 CPE