Home EC-Council Training CoursesEC-Council Threat Intelligence Essentials (TIE)

EC-Council Threat Intelligence Essentials (TIE)

Guaranteed to Run
Price
$1,095.00
Duration
2 Days
Delivery Methods
Virtual Instructor Led Private Group
Delivery
Virtual
EST
Description
Objectives
Prerequisites
Content
Course Description

Cybersecurity and technology-based mitigation approaches rely heavily on intelligence. This program aims to enhance your understanding and implementation of foundational threat intelligence concepts, including differentiating intelligence from data or information and highlighting its vital role in modern cybersecurity. Additionally, the program enables students to thoroughly explore the threat intelligence lifecycle, understand its significance in shaping team roles, delve into the ethical and legal considerations, and understand the importance of measuring threat intelligence effectiveness.

As you progress through the program, you’ll master the different types of threat intelligence: strategic, operational, tactical, and technical. You’ll learn how each uniquely contributes to areas like regulatory compliance and risk management. In the later modules, you’ll engage in hands-on activities that involve data collection, analysis, and the use of Threat Intelligence Platforms (TIPs) for real-world applications in threat hunting and detection. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role. The program culminates with a forward-looking perspective, emphasizing the importance of continuous learning and staying ahead of future trends in this ever-evolving field. Threat Intelligence Essentials is designed to prepare students for progressive careers as Security Operations Center (SOC) Analysts, Threat Intelligence Analysts, IT Risk Analysts, or Cybersecurity Analysts, enabling them to confidently tackle today’s cybersecurity challenges with expertise!

Course Objectives
  • Essential threat intelligence terminology, the role of intelligence in cybersecurity, and threat intelligence maturity models.
  • Evaluating different types of threat intelligence, such as strategic, operational, and more focused forms, which guide vulnerability management or regulatory landscapes.
  • The cyber threat landscape, trends and ongoing challenges
  • Data collection and sources of threat intelligence
  • Threat Intelligence Platforms (TIPs)
  • Threat intelligence analysis
  • Threat hunting and detection
  • Threat intelligence sharing and collaboration
  • Threat intelligence in incident response
  • Future trends and continuous learning
Who Should Attend?
  • School students, graduates, professionals, career starters and changers, IT/Technology/Cybersecurity teams with little or no work experience.
  • Anyone who wants to start a career in cybersecurity or threat intelligence.
  • Anyone interested in threat intelligence, Indicators of Compromise (IoC) analysis, defensive cybersecurity operations, and incident response.
  • Any professional involved in securing public, private, and hybrid cloud infrastructures, identities, data, and applications.
  • IT / Cybersecurity professionals, system administrators, cloud administrators, cybersecurity administrators, engineers, and architects will also benefit from this course.
Course Prerequisites
  • There are no recommended prerequisites for the TIE course.

  • The course is open to individuals from diverse backgrounds and experience levels

Course Content
Module 1: Introduction to Threat Intelligence
Module 2: Types of Threat Intelligence
Module 3: Cyber Threat Landscape
Module 4: Data Collection and Sources of Threat Intelligence
Module 5: Threat Intelligence Platforms
Module 6: Threat Intelligence Analysis
Module 7: Threat Hunting and Detection
Module 8: Threat Intelligence Sharing and Collaboration
Module 9: Threat Intelligence in Incident Response
Module 10: Future Trends and Continuous Learning
Do You Need Help? Please Fill Out The Form Below
First Name*
Last Name*
Business Email*
Phone Number*
What do you need assistance with?*
Best way to contact me*
How can we help you?*