Analysis Threat Report on Cyber Espionage - Cyber Security Course 2025
Cyber espionage is one of the most significant threats to national security and global corporations. But how do you make sense of the complex threat reports about groups like APT29 or Lazarus? In this video, we'll dissect a real-world cyber espionage campaign step-by-step, teaching you the analytical skills every SOC analyst and threat intelligence professional needs.
In this video, you will learn:
• A Framework for Analysis: How to break down any threat report systematically.
• Key Indicators of Compromise (IOCs): What to look for (IPs, Domains, File Hashes).
• Understanding TTPs (Tactics, T…
Watch on YouTube ↗
(saves to browser)
Chapters (8)
The Reality of Modern Cyber Espionage
1:20
Meet the Adversary: Overview of the Threat Group
2:45
Step 1: Extracting IOCs (Indicators of Compromise)
4:30
Step 2: Analyzing TTPs with the MITRE ATT&CK Framework
7:15
Step 3: The Kill Chain: Understanding the Attack Lifecycle
9:40
Step 4: Decoding the Motivation (Espionage, Sabotage, Theft)
11:50
Step 5: Turning Intelligence into Defense - Writing Detection Rules
14:30
Career Spotlight: Becoming a Threat Intelligence Analyst
DeepCamp AI