π§ Putting all my notes into one spot. Notes from learning CTI. I have used Andy Piazza's Cyber Threat Intelligence Study Plan and Katie Nickels' A Cyber Threat Intelligence Self-Study Plan as guides. I have also gone through a stack of CTI analyst job ads to find the skills hiring managers want.
-
π» How Computers Work
- Computer Software
- Computer Hardware
- Data + Storage
-
- The Internet
- Bit Sending
- IP Addresses + DNS
- Packets, Routing + Reliability
- TCP
- The OSI Model
-
- Essential Security Principles
- Fundamentals of Confidentiality, Integrity and Availability
- Security Architect Role + Tools
- Identity and Access Management
- Endpoints
- Networks
- Application Security
- Data Security
- Detection
- Reponse
-
- Basic Threat Landscape
- Different Types of Malware
- Basic Mitigation Strategies
-
π Encryption Standards
-
ποΈ Writing with Clarity
- Clarity
- Influence
- Story
- Grammar
- Audience
- Structure
- Message
-
ποΈ Threat Intel for Everyone: Writing Like A Journalist To Produce Clear, Concise Reports
- Key elements of writing CTI reports
- Inverted Pyramid of News
- CTI report Structure
- Headline | Subject Line
- Lead
- Nutgraf
- Conclusion
- Deadlines
- Clean Up Your Writing
- Resources
-
π¬ Threat Research
-
π¦ Malware Analysis
-
Study APT Reports
-
Critical Thinking
-
Intelligence Analysis Fundamentals