Home EC-Council Training CoursesEC-Council Certified Threat Intelligence Analyst (CTIA) v2

EC-Council Certified Threat Intelligence Analyst (CTIA) v2

Guaranteed to Run
Price
$2,097.00
Duration
3 Days
Delivery Methods
Virtual Instructor Led Private Group
Delivery
Virtual
EST
Description
Objectives
Prerequisites
Content
Course Description

EC-Council's Certified Threat Intelligence Analyst (C|TIA) Certification is a comprehensive specialist-level professional program focused on the ever-evolving domain of threat intelligence. The program is designed for individuals involved in collecting, analyzing, and disseminating threat intelligence information.

C|TIA covers various topics, including the fundamentals of threat intelligence, the use of threat intelligence tools and techniques, and the development of a threat intelligence program. This course focuses on refining data and information into actionable intelligence that can be used to prevent, detect, and monitor cyber-attacks. It addresses all stages involved in the threat intelligence lifecycle, and this attention toward a realistic and futuristic approach makes it one of the most comprehensive threat intelligence certifications in the market today.

The program provides credible professional insights required for a successful threat intelligence career and enhances your overall skills, thus increasing your employability. It is desired by most cybersecurity engineers, analysts, and professionals globally and is respected by hiring authorities. Ideal for individuals working in information security, network security, incident response, and other related fields. Mastering skills and earning this certification can help enhance threat intelligence operations and investments for cybersecurity individuals and teams.

Course Objectives
  • Fundamentals of threat intelligence (Threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, platforms, etc.)
  • Various cybersecurity threats and attack frameworks (Advanced Persistent Threats,
  • Cyber Kill Chain Methodology, MITRE ATT&CK Framework, Diamond Model of Intrusion Analysis, etc.)
  • Various steps involved in planning a threat intelligence program (Requirements, planning, direction, and review)
  • Different types of threat intelligence feeds, sources, data collection methods
  • Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), malware analysis, and Python Scripting
  • Threat intelligence data processing and exploitation
  • Threat data analysis techniques (Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)
  • Complete threat analysis process, which includes threat modeling, fine-tuning, evaluation, and runbook and knowledge base creation
  • Threat intelligence sharing and collaboration using Python Scripting
  • Different platforms, acts, and regulations for sharing intelligence
  • How to perform threat intelligence in a cloud environment
  • Fundamentals of threat hunting (Threat hunting types, process, loop, methodology, etc.)
  • Threat-hunting automation using Python Scripting
  • Threat intelligence in SOC operations, incident response, and risk management
Who Should Attend?
  • Cyber Threat Intelligence Analyst
  • Cyber Threat Hunter
  • Cyber Threat Intelligence Associate/Researcher/Consultant
  • Cyber Security/Information Security Threat Intelligence Analyst
  • Cyber Threat Intelligence Engineer/Specialist /Lead/Manager
  • SOC Threat Intelligence Analyst
  • Principal Cybercrime Threat Intelligence Analyst
  • Threat Management Associate Director
  • Project Manager/Director of Threat Intelligence
Course Prerequisites
  • Mid-level to high-level cybersecurity professionals with a minimum of three years of experience.
  • Individuals with EC-Council's C|EH and C|ND certifications can enroll in this course.
Course Content
Module 1: Introduction to Threat Intelligence
Module 2: Cyber Threats and Attack Frameworks
Module 3: Requirements, Planning, Direction, and Review
Module 4: Data Collection and Processing
Module 5: Data Analysis
Module 6: Intelligence Reporting and Dissemination
Module 7: Threat Hunting and Detection
Module 8: Threat Intelligence in SOC Operations, Incident Response, and Risk Management
Do You Need Help? Please Fill Out The Form Below
First Name*
Last Name*
Business Email*
Phone Number*
What do you need assistance with?*
Best way to contact me*
How can we help you?*