TIA-201 Diamond Model of Intrusion Analysis
Dive deep with the Diamond Model's principal creator and learn how to improve your security analysis and security operations through the application of the Diamond Model.
Time Commitment: Approximately 12-14 hours
The Diamond Model of Intrusion Analysis is a landmark cybersecurity work and recognized by the community as one of the key resources for all cybersecurity analysts to understand. This course is for all cybersecurity analyst experience levels.
Taught by the primary Diamond Model creator, this is the definitive course on the subject. Structured as a rigorous graduate course with a significant amount of related readings, thought exercises, practical exercises, and regular quizzes, this course will take an analyst at any level and grow their capabilities and abilities.
After this course analysts will have a fresh and advanced perspective on every analytic problem and task.
The course concludes with a final exam of 30 questions requiring a 70% or better passing grade. A passing grade will result in certifying the student in Diamond Model analysis and an associated certificate.
The course material and exam is available to students for 364 days after purchase.
Sergio Caltagirone has not only made what is within the original paper very digestible, but he also further expands upon the key concepts of the diamond mode...
Read MoreSergio Caltagirone has not only made what is within the original paper very digestible, but he also further expands upon the key concepts of the diamond model. I have read the paper a handful of times before this course. Coming out of it, I can confidently say that my understanding of the diamond model has deepened and will be implementing some of the key takeaways that I have gained within our CTI team.
Read LessI started the course because I was always interested in the Diamond Model but never read the complete paper only the summary document. The combination of sp...
Read MoreI started the course because I was always interested in the Diamond Model but never read the complete paper only the summary document. The combination of split reading the document in several sessions, additionally reading other really good and relevant papers and finally explaining everything in between in short videos is a perfect way to teach and learn. Seeing how this model can be used together with the Cyber Kill Chain and the MITRE ATT&CK framework and how they complement each other is really great. Attending this course was fun and boosted my level of knowledge.
Read LessOne of the best courses I have ever taken in my career. Totally disruptive !!!
One of the best courses I have ever taken in my career. Totally disruptive !!!
Read LessDiamond Model of Intrusion Analysis training is one of the best on my CTI training path so far, and I highly recommend it for all Analysts and Managers in ...
Read MoreDiamond Model of Intrusion Analysis training is one of the best on my CTI training path so far, and I highly recommend it for all Analysts and Managers in this field. Regardless of what you are focused on, Requirements, Collection, Analysis or Writing Intel products. It is good training for people from the DFIR field as well - Threat Hunters, Incident Responders. I've read the Diamond Model paper before the course, I even used it with my approach, figuring out how to leverage strong sides of the model, but it has a source in my previous experience, not the training. With Sergio's (trainer) guidance, comments, exercises (+explanation!), which allows settling the Diamond Model in my world, I'm much more familiar and aware of the co-author's philosophy, purposes, powers and limitations of the model. The course is worth much more than the current price. Thank you, Sergio!
Read LessWho do you want to learn how to master the Diamond Model from if not from one of its creators? I recommend this course to all CTI analysts. Thanks to Sergio...
Read MoreWho do you want to learn how to master the Diamond Model from if not from one of its creators? I recommend this course to all CTI analysts. Thanks to Sergio for that.
Read LessWelcome Letter
How to use this course
Intro Survey
The Diamond Model Introduction
FREE PREVIEWOptional: Read "Stalking the Wily Hacker"
FREE PREVIEWOptional: Watch Cuckoo's Egg Presentation by Cliff Stoll
FREE PREVIEWOptional: 36C3 - The KGB Hack: 30 Years Later [Cuckoo's Egg Follow-up]
Optional: Read Psychology of Intelligence Analysis
FREE PREVIEWRead Diamond Model Sections 1-3 pages 1-8
Diamond Model Overview
Test your learning
Prerequisite: Read Section 4 pages 8-19
Diamond Model Event
Diamond Meta-Features
Test your learning
Read Diamond Model Section 5 pages 19-24
Extended Diamond Model Overview and Social-Political Feature
Persistence and Victimology
Technology Diamond Feature
Test your learning
Taught by the "Godfather of Threat Intelligence," students at all levels learn how to produce, consume, use, and evaluate threat intelligence across all cybersecurity operations roles like analysts, pen testers, incident responders.
$3,999
Learn the principles, mistakes to avoid, and secrets behind building and operating a successful threat intelligence function or team at any organization from an instructor who has done it for over 15 years.
Written and verbal communication skills define the best cybersecurity analysts. This course will teach you the best presentation techniques, how to create great presentation slides, and how to drive decisions with compelling arguments.