Practical Intrusion Analysis Using the Diamond Model
The Diamond Model provides security professionals a means to better understanding the adversary as they work to identify the victims, capabilities, and infrastructure of a cybersecurity event. It also assists in understanding the adversary’s technology and social-political motivations and intentions. During this course, you take on the role of a cyber intelligence analyst and gain experience populating a Diamond Model following a cybersecurity event. Learn the core features of the Diamond Model and how to apply source information to communicate event details.
- Diamond Model Overview
- Creating a Diamond Model
Who Should Take This Course:
Cybersecurity professionals interested in or working with cyber intelligence and cyber threat intelligence analysts.
About This Course:
Express Learning courses are created by industry experts and are designed to quickly address a hot industry topic or trend. Through instructional content, learning activities and knowledge checks you will learn about the features of the Diamond Model and when to use it. The course concludes with creating a Diamond based on a cyber event. At the end of the course you will be asked to take a final assessment and must score 70% or higher prior to receiving a certificate of completion and earning continuing professional education (CPE) credits.