Threat Intelligence & Attribution Best Practices: Attribution Analysis
Cyber attribution analysis is used to track identify and incriminate perpetrators of cyber attacks or exploits and is a must-know offensive security operations technique. In this course youll learn about the fundamental concepts and critical concerns related to attribution. Youll start by examining the different attribution types and levels before exploring attribution indicators techniques best practices tools and challenges. Moving on youll gain insight into how to identify and interpret forensic artifacts gathered from various sources manage evidence and make attribution judgments and assessments. Youll then study geopolitics the Intelligence Community and legal considerations as they relate to cyber threats and attribution. Lastly youll look into how malware cyber threat reverse engineering code sharing analysis and network behavior analysis lead to attribution.