Adam Goss
Learn all things cyber threat intelligence, threat hunting, and custom tooling!
I have worked in security operations, threat intelligence, and cyber security engineering for international managed security service providers (MSSPs), industry-leading professional service companies, and within the UK telecommunications industry. I want to share my experiences and insights with you.
My team and I aim to help demystify cyber threat intelligence for businesses and individuals. This channel is one of our many free resources to further this mission. I hope you find it useful no matter where you are on your journey!
MITRE ATT&CK, Diamond Model или Cyber Kill Chain? Победитель определён
Выход из SOC: почему профессия инженера-детектора — это лучший вариант карьерного роста
Beyond "Fake News": The CTI Analyst's Guide to Information Disorder (And How to Beat It)
Мои лучшие книги, курсы и ресурсы для освоения компьютерной интерактивной техники: полная дорожна...
Tactical vs. Operational CTI: Stop Blocking IOCs, Start Threat Hunting!
The 4 CTI Sharing Communities Every Analyst MUST Know (ISACs, OSINT & More!)
Jupyter Notebooks for Cyber Threat Intelligence: A Practical Guide
How to Become a CTI Analyst: Zero to Hero (The Ultimate Beginner's Guide)
There’s a Nu-shell in town! Powerful cmdline analysis // Nushell Tutorial
You're Doing CTI Wrong: A Better Way to Organize Your OSINT Data Collection!
4 Key Skills to Investigate Any Cyber Incident | Hack the Box Brutus Sherlock Walkthrough
How to Analyze Real Phishing Emails with ANY.RUN | Step-by-Step Tutorial
The Pyramid of Pain: A Guide to Smarter Cyber Defense!
MITRE ATT&CK Demystified: A Complete Threat Intelligence Bible!
How to Use Estimative Language to Boost Confident Assessments
Crown Jewel Analysis: Identifying Your Business’s Most Valuable Assets
Master YARA Rules: Strengthen Your Cyber Security with Custom Detections
Analysis of Competing Hypotheses (ACH): Finding Plausible Answers
Traffic Light Protocol: Securing Cyber Threat Information Like a Pro
The Diamond Model Explained: Intelligence-Driven Intrusion Analysis
MITRE CTI Blueprints: A Game Changer for Threat Intelligence Reporting
Malware Configuration Parsers: Discover How to Hunt for Malware Today!
Collection Management Framework: Streamline Data Gathering and Investigations
How to Use Threat Modeling for Cyber Threat Intelligence
The Cyber Kill Chain Explained: Map & Analyze Cyber Attacks!
Unlocking the Courses of Action Matrix: Planning Your Defenses
How to Use IOCs: Navigating the Indicator Lifecycle
Mastering Intelligence Requirements: Everything You Need to Know
Essential Guide to the Cyber Threat Intelligence Lifecycle
Cyber Threat Intelligence Explained: A Quick Guide for Beginners