
“Threat Actor Profiling: Know Your Enemy” is a 4-hour online workshop that teaches security practitioners how to identify, profile, and prioritize the threat actors most likely to come after their organization.
Live Training $25.00
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date: May 15th, 2026 @ 12:00 PM EDT
Description
“Threat Actor Profiling: Know Your Enemy” is a 4-hour online workshop that teaches security practitioners how to identify, profile, and prioritize the threat actors most likely to come after their organization.
Drawing from real-world intelligence frameworks, participants move from understanding adversary types, including financially motivated, nation-state, ideological, and opportunistic actors, to building structured threat actor profiles and scoring adversaries.
Through three hands-on labs, analysts leave with a repeatable process for turning threat intelligence into engineering priorities and boardroom-ready risk narratives.
No exam. Just tools, frameworks, and the mindset to focus your efforts on legitimate, motivated threats, instead of defending against the whole internet.
-
System Requirements
- A browser and internet connection.
Syllabus
Syllabus
Module 1 — Who Are Threat Actors? (30 min, Lecture)
-
The four primary threat actor groups: financially motivated, nation-state, hacktivists, thrill seekers
-
Their motivations, signature behaviors, and common TTPs
-
Cross-group convergence and attack chain fundamentals
Lab 1 — Threat Actor Identification & Categorization (30 min)
-
Research one actor from each category using public intelligence sources
-
Identify motivations, top TTPs, notable campaigns, and one example of cross-group behavior
Module 2 — Building Threat Actor Profiles (35 min, Lecture)
-
Profile structure using the Curated Intelligence framework (who, why, how, so what)
-
Profiles as living documents
-
The four targeting lenses: sector, rivals, customers, and region
Lab 2 — Draft a Threat Actor Profile (35 min)
-
Build a profile for an assigned actor against a financial services scenario
-
Map TTPs to MITRE ATT&CK
-
Apply targeting lenses
-
Write a CISO-ready executive summary
-
Identify one detection gap
Module 3 — Quantifying Threat Actors with Threat Box (40 min, Lecture)
-
Andy Piazza’s Threat Box model: scoring intent and capability across four attack categories (espionage, destructive, disruptive, cybercrime)
-
Willingness and novelty modifiers
-
Reading the 5×5 matrix and translating scores to defense actions
Lab 3 — Threat Box Scoring Exercise (35 min)
-
Score the Lab 2 actor across all four attack categories
-
Cite evidence
-
Apply the willingness modifier
-
Plot the matrix
-
Produce three prioritized defense actions for the engineering backlog
Module 4 — From Profiles to Action & Wrap-Up (15 min, Discussion)
-
The five-step playbook: shortlist, score, translate to engineering work, measure quarterly, keep current
-
Key takeaways and next steps
FAQ
-
Identify the types of threat actors and what motivates each one
-
Understand how and why threat actor groups blend, collaborate, and cross boundaries
-
Follow the attack chain from initial access to final impact
-
Build a structured threat actor profile using a real-world template
-
Use targeting lenses to determine which adversaries are most relevant to your organization
-
Score and prioritize threat actors
-
Turn threat actor scores into concrete defense actions and engineering priorities
-
Learn how to effectively present relevant threat actors to managers
-
SOC Analysts
-
Threat Intelligence Analysts
-
Incident Responders
-
Security Engineers
Beginning to intermediate (practitioner level)
Basic understanding of cybersecurity concepts such as:
-
Common attack types (phishing, malware, lateral movement)
-
Security operations or incident response workflows
Familiarity with logs, alerts, or SIEM tools is helpful but not required.
No prior CTI experience is required.
About the Instructor
Wade Wells
"Wondering in the logs"Bio
Wade Wells is the Lead Detection Engineer for a Fortune 30 financial company. He has worked for eight years in security operations, performing threat hunting, cyber threat intelligence, and detection engineering, primarily in the financial sector. Active in the cybersecurity community, Wade frequently speaks at prominent industry events and is involved with several security-focused organizations.
Register for Upcoming
-
Filter by Product Date
-
Filter by Product Instructor
-
Filter by Product Type
Workshop: Threat Actor Profiling: Know Your Enemy
Pay What You Can
Live Training Wade Wells
Virtual
- Certificate of completion
- 6 months class recording access via Discord
For tuition assistance with this course please send an email to: [email protected]
Related products
-
Kevin KlingbileLiveOD16 Hrs
Defending M365 & Azure
View Course This product has multiple variants. The options may be chosen on the product pageJun 15 - Jun 16
-
Multiple InstructorsLive4 Hrs
Workshop: Hacking AI-LLM Applications
View Course This product has multiple variants. The options may be chosen on the product page -
Alissa TorresLiveOD16 Hrs
Advanced Endpoint Investigations
View Course This product has multiple variants. The options may be chosen on the product page -
Joff ThyerLive16 Hrs
Enterprise Attacker Emulation and C2 Implant Development
View Course

