Section 2: Getting to Know the Adversaries
In this section, you will learn to understand different threat actors, their motivations, capabilities, and attack vectors. You will also learn to use and apply frameworks such as MITRE ATT&CK and models such as the Cyber Kill Chain framework to map malicious behaviors in incident response. Afterward, you will know the importance of using threat intelligence to identify threats during the initial stages of an investigation.
This section comprises the following chapters:
- Chapter 5, Identifying and Profiling Threat Actors
- Chapter 6, Understanding the Cyber Kill Chain and the MITRE ATT&CK Framework
- Chapter 7, Using Cyber Threat Intelligence in Incident Response