This is an old revision of the document!
Lecture 01 – frameworks, cyber threats and threat actors Lecture 02 – Lecture 03 – Lecture 04 – cyberdefense – networks Lecture 05 – cyberdefense – mobile devices Lecture 06 – cyberdefense – mobile devices
Lecture 07 – (open) threat intelligence Data gathering tools and approaches, data analysis techniques Lecture 08 – threat intelligence Online Tracking Techniques Digital Fingerprinting Lecture 09 – threat intelligence (IoT) Search Engine Techniques News Search Document & Digital images Search Lecture 10 – threat intelligence Social Media Intelligence Tracking Photos Downloaded from Facebook to Its Source Profile Twitter Advanced Search Operators LinkedIn Search Lecture 11 – threat intelligence - TOR the “Dark Web”
Lecture 12 – threat intelligence the nature of Advanced Persistent Threats (APTs), well-known state operations and threats, challenges for attribution/action, interaction between state actors and proxies.