From the course: Ethical Hacking: Introduction to Ethical Hacking
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Analyzing using the diamond model
From the course: Ethical Hacking: Introduction to Ethical Hacking
Analyzing using the diamond model
- [Instructor] The diamond model of intrusion analysis is a framework developed by the intelligence community to break down each element of an intrusion. In this segment we'll step through the process of an intrusion event using the diamond model. First, let's go to this site where you can download the document. So select this, which will download a PDF. Once open, scroll through the document to page 10 to read a little bit more about how the diamond model works and to view the model. In the graphic we see the four core features of an intrusion event, adversary, capability, infrastructure, and victim. When a threat is discovered, the elements within the diamond model provide a way to analyze the attack and helps to illustrate how an adversary pivots from one event to the next. In addition to the four core features we see metadata, which is essential in analyzing, grouping, and piecing together the events after a cyber…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
Understanding the cyber kill chain4m 48s
-
(Locked)
Utilizing MITRE ATT&CK3m 40s
-
(Locked)
Analyzing using the diamond model4m 41s
-
(Locked)
Identifying adversary behavior4m 21s
-
(Locked)
Discovering indicators of compromise4m 32s
-
(Locked)
Challenge: The cyber kill chain1m 22s
-
(Locked)
Solution: The cyber kill chain2m 33s
-
-
-
-