MISP (Malware Information Sharing Platform and Threat Sharing) is an open-source threat intelligence platform that allows you to share, collate, analyze, and distribute threat intelligence. In this series you will learn how to make the most of this platform and integrate it into your CTI workflow.
Discover the premier open-source threat intelligence sharing platform, its key features, and how you can use it to elevate your security posture!
Learn how to install and set up MISP. You will discover the various installation methods available, which is best, and how to configure your MISP instance to begin ingesting threat intelligence.
Learn how to start using MISP. You will learn about MISP events, how to create them, and how to add context to them using MISP’s galaxies and taxonomies
Learn how to add open-source threat intelligence feeds to your MISP instance so you can begin rapidly populating the threat intelligence platform with the latest data.
Learn how to search and filter MISP events and attributes to find threat intelligence relevant to you.
Learn to use the MISP API to make the most of your MISP instance. You will see how to get statistics about your MISP instance, search for attributes and events, and visualize data you’ve added to your instance.
Discover how to turn MISP attributes into Indicators of Compromise that you can export as a CSV file and upload to your security solution for detection.
Check out these courses offered by Zero-Point Security. They will teach you all things red teaming from creating exploits, writing your own C2 framework, and emulating real-world threat actors.
If you want more of a challenge, take on one of their certification exams and land your next job in cyber:
Check out The All-Access Membership Pass by TCM Academy. for courses on hacking/pentesting, malware analysis, digital forensics, programming/scripting, GRC, and more!
If you’re looking to level up your skills even more, have a go at one of their certifications: