Lecture 1 - Introduction to the Course - Practical Cyber Security for Cyber Practitioners
Lecture 2 - Introduction to Cyber Kill Chains - Lockheed Martin Kill Chain
Lecture 3 - Understanding Cyber Kill Chain - Delivery, Exploitation, and Installation
Lecture 4 - Mastering the Cyber Kill Chain: Command and Control and Actions on Objectives
Lecture 5 - Introduction to MITRE ATT&CK framework
Lecture 6 - Understanding MITRE ATT&CK: A Guide to Cyber Threat Intelligence
Lecture 7 - Mapping to ATT&CK from Finished Cyber Incident
Lecture 8 - Introduction to Mapping to ATT&CK from Raw Data
Lecture 9 - Mapping to ATT&CK from RAW Data
Lecture 10 - Storing and Analyzing ATT&CK-Mapped Data
Lecture 11 - Making Defensive Recommendations from ATT&CK-Mapped Data
Lecture 12 - TTP Mapping and Introduction to Unified Kill Chain
Lecture 13 - Deep Dive into Unified Kill Chain - Part 1
Lecture 14 - Deep Dive into Unified Kill Chain - Part 2
Lecture 15 - Introduction to MITRE DEF3ND Framework
Lecture 16 - Deep dive into MITRE DEF3ND framework - I
Lecture 17 - Deep dive into MITRE DEF3ND framework - II
Lecture 18 - MITRE DEF3ND Framework Conclusion and Introduction to Risk Identification and Assessment
Lecture 19 - Deep dive into Risk Assessment - I
Lecture 20 - Deep dive into Risk Assessment - II
Lecture 21 - Introduction to Cyber Crisis Management
Lecture 22 - Cyber Crisis Conclusion and Introduction to Cyber Resilience
Lecture 23 - Deep dive into Cyber Resilience - I
Lecture 24 - Deep dive into Cyber Resilience - II
Lecture 25 - Cyber Resilience Review (Self-Assessment)
Lecture 26 - Cyber Threat Intelligence Sharing - STIX Tutorial - Part 1
Lecture 27 - Cyber Threat Intelligence Sharing - STIX Tutorial - Part 2
Lecture 28 - Introduction to SCAP, CVE and CCE
Lecture 29 - Deep Dive into CVE, CCE, CPE, CVSS Scoring, XCCDF, OVAL Languages - Part 1
Lecture 30
Lecture 31