Practical Intrusion Analysis Using the Diamond Model
*(ISC)² Members/Associates can access this course for free by logging in above and clicking the 'My Courses' menu item.
The Diamond Model provides security professionals a means to better understanding the enemy (adversary) as they work to identify the victims, capabilities, and infrastructure of a cybersecurity event. It also assists in understanding the adversary’s technology and social-political motivations and intentions. In this Express Learning course, you will take on the role of a cyber intelligence analyst and gain experience populating a Diamond Model following a cybersecurity event. Learn the core features of the Diamond Model and how to apply source information to communicate event details.
This course includes the following two (2) modules: (1) Diamond Model Overview (2) Creating a Diamond Model.
Audience or Who Should Take This Course
Cybersecurity professionals who are interested or working with cyber intelligence and cyber threat intelligence analysts.
Knowledge of cybersecurity concepts.
How This Course Works
Through instructional content, learning activities and knowledge checks you will learn about the features of the Diamond Model and when to use it. The course will conclude with a creating a Diamond Model based on a cyber event.
All learning modules must be completed, including the course evaluation and a score of 70% or above earned on the final assessment, to receive your certificate of completion and earn 2 Group A CPE Credits towards your (ISC)² credentials.
Please make sure at the end of the course that you download and retain the certificate of completion as proof of credits earned. CPEs earned for this course may be eligible for continuing professional education credits for non-(ISC)² certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.