Courses
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Building and Enhancing Your CTI Program with Strategic Intelligence Analysis - The Formula!
Data Provenance - OPSEC Rules - Hunchly - Rules of Engagement - Cyber Personas
Getting Started
Hunchly Lecture - OPSEC Rules (65:51)
Rules of Engagement and Cyber Personas (41:10)
Documents you need
Strategic Intelligence Analysis Week 1
Strategic Intelligence Analysis - Part I (105:35)
Strategic Intelligence Analysis - Part II (96:07)
Readings - Tools
Start Building and Enhancing Your Program - Stakeholder Analysis
Stakeholder Analysis - Tracking (33:24)
Strategic Intelligence Analysis Week 2 to 3
Strategic Intelligence Analysis - Part III (75:43)
Strategic Intelligence Analysis - Part IV (74:00)
Readings - Process Document
Assignment 1
Assignment 2
Quiz
Start Building and Enhancing Your Program - Adversary Targeting/Threat Matrices
Adversary Targeting Lecture (36:47)
Assignment - Templates - Matrices - Handbook
Adversary Groups
Reference Documents
Readings and Support Documents
Intelligence Readings - NATO - CIA - Dutch Defense - Encyclopedia
Main Course Spreadsheet Templates
Building and Enhancing Your Program - Intelligence Requirements
Intelligence Requirements Lecture (53:21)
Assignment - Templates and Tools
Reference Documents
Strategic Intelligence Analysis Weeks 3 to 5
Strategic Intelligence Analysis - Part V Plus Critical Thinking (186:36)
Strategic Intelligence Analysis - Cognitive Bias (58:52)
Readings - Tools
Assignment
Introduction to ACH (28:34)
ACH Readings and Tools
Quiz
Collection and Analysis Assignment (5:33)
Building and Enhancing Your Program - Collection Management
Source Evaluation and Collection Management (78:55)
Assignment and Templates
Open Source Tools, Browser Add-Ons Targeted Toolsets
Mitre ATT&CK
New Lecture
Strategic Intelligence Analysis Weeks 6 to 7
Strategic Intelligence Analysis - Analytic Writing Part 1 (78:44)
Strategic Intelligence Analysis - Analytic Writing Part 2 (84:29)
Readings - Tools
Assignment (4:34)
Quiz
Strategic Intelligence Analysis - Structured Analytic Techniques - Week 8 to 9
Structured Intelligence Techniques - Lectures (216:59)
Readings - Tools - Technique How To's
Additional Videos on Structured Analytic Techniques (20:33)
Quiz
Building and Enhancing Your Program - STEMPLES Plus - Indicators of Change - Hofstede Principles
Lecture on STEMPLES Plus (58:45)
Assignment - Templates - Examples
Strategic Intelligence Analysis Week 10
Strategic Intelligence Analysis - Reporting and Briefs (85:46)
Report Template Examples
Quiz
Analyst Activities - Week 11
Strategic Intelligence Analysis - Analyst Activities-Cognitive Elements (135:30)
Readings - Tools
Quiz
Threat Hunting - Lecture and Files (31:27)
Building a Cyber Intelligence Program - Part 1
Part 1 of the Building a Cyber Intelligence Program Series (133:00)
Quiz Two
Quiz Three
Quiz Four
Quiz Five
Building a Cyber Intelligence Program - Parts 2 & 3
Parts 2 & 3 of the Building a Cyber Intelligence Program Series (67:32)
Building a Cyber Intelligence Program - Part 4
Part 4 Building a Cyber Intelligence Program Series - Types of Intelligence (137:54)
Strategic Intelligence Analysis - Looking at building your Cyber Intelligence Program Week 12
Vision-Mission-Goals-Objectives
Measuring your goals and objectives
Cyber Intelligence Maturity Model
Standard Operating Procedures
The TIP Selection Process
Assembling the Fragments (6:46)
Information or Disinformation - Talk given at IS2 - Prague December 2020 (67:53)
Table Top Exercise (25:07)
Argument Mapping
CTI Organizational Structure - Final (88:53)
Teach online with
The TIP Selection Process
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock