In this post I'll explain and elaborate in-depth on my initiative to train users on threat intelligence cybercrime research and OSINT the pros and cons of the process the potential widespread benefits of the process of teaching and training others on what you know do and can do most where the ultimate idea and basically my idea was and is to spread as much knowledge and education based on what I know and have achieved in the field that I would ultimately aim to teach and educate others and inspire them to do the same in the field.
One of the most important steps when doing this and when attempting to do it to set you mentality straight with the idea to not just turn your users into self driving technical information processing and enriching power users but to also do your best to try to walk them through your own experience and achievements in the field and how you do did it and how they can do it too.
My initial plan was:
- come up with a web site
- record and share sample training videos
- make sure your site is SEO friendly
- monitor the SEO process in the Google Search Console
- publish your training program curriculum on your web site to attract visitors
My initial training program curriculum is as follows:
Table of Contents
Chapter 01 - Introduction
Chapter 02 - Who is Dancho Danchev?
Chapter 02 - Past Projects
Chapter 02 - Current Projects
Chapter 02 - Achievements
Chapter 03 - What is Threat Intelligence?
Chapter 04 - The Basics of Threat Intelligence
Chapter 05 - Overview of Threat Intelligence Methodologies
- Reactive Threat Intelligence
- Proactive Threat Intelligence
Chapter 06 - Current Threat Intelligence Gathering Platforms
Chapter 07 - Different Types of Threat Intelligence
- Threat Intelligence Gathering Using Commercial Sources
- Threat Intelligence Gathering Using Public Sources
- Cyber Threat Actor Profiling
- Using OSINT for Threat Intelligence Gathering
- The Basics of Threat Intelligence Gathering in the Context of Geopolitical Analysis
Chapter 08 - Examples of Threat Intelligence Gathering
- Hybrid Analysis Malware Sandbox Discussion and Demonstration
- Any.run Malware Sandbox Discussion and Demonstration
- Forcepoint CSI Real-Time Malware Scanner Discussion and Demonstration
- URLQuery.net Malware Scanner Discussion and Demonstration
- VMRay Threat Feed Discussion and Demonstration
- Abuse.ch URL Haus Discussion and Demonstration
Chapter 09 - Using OSINT in the Context of Threat Intelligence Gathering
Chapter 10 - Threat Intelligence Gathering - A Case Study
- OpenCTI Discussion and Demonstration
- MISP Discussion and Demonstration
- Conti Ransomware Gang Real-Time OSINT Analysis
- Cybercrime Graph Analysis
- Iran's Hacker Scene in the Context of Threat Intelligence Gathering
- FBI's Most Wanted Cybercriminals list in the Context of Threat Intelligence Gathering
- U.S Secret Service's Most Wanted Cybercriminals list in the Context of Threat Intelligence Gathering
Chapter 11 - Threat Intelligence Gathering Tools and Inventory
- Maltego Discussion and Demonstration
- Sentinel Visualizer Discussion and Demonstration
- Russian Cybercriminals OSINT Discussion and Demonstration
Chapter 12 - The Future of Threat Intelligence Gathering
Chapter 13 - Conclusion
Once we set up the technical foundations and once I know that the technical foundations are properly set for my users to know that they can not just deal with the technical material and specifications in the field but also work with it and come up with technical content and research and findings on their own I wanted to really dig into deep sharing my personal experience in the field in terms of inspiring them in a way to properly think and know that they can and should make an impact in the field with hard work technical research and analysis and information processing and gathering ultimately serving the needs of everyone in the field in terms of distribution and dissemination of their research and findings potentially making a ground breaking impact which is what I really wanted to achieve with all of my users.
The results of my initiative were four full hours of training a user on my knowledge and expertise in the field in Bulgarian where I sincerely hope that the user has ended up having the necessary understanding and experience of the entire process and that he learnt a lot where I was extremely excited to participate in this explain everything I know about the process in the field record and share the training with the user.
Here are the videos:
Does anyone else have any experience with training on the topic of threat intelligence cybercrime research and osint? I will wait for your feedback and for you to share your experience and expertise in the field.