Certified Threat Intelligence Analyst | CTIA

Help organizations identify and mitigate business risks

Requirements:
  • English language

This program will benefit those who want to build effective threat intelligence for their organization to combat current cyber attacks and prevent future attacks.

Target audience:

  • Threat Hunters

  • SOC Professionals

  • CIO, Security Manager

  • Network security & Site administrators

  • Individuals interested in preventing cyber threats

  • Computer Network Auditor (CNA),  Analyst (CNA), Defence (CND)

  • Infrastructure Support, IS/IT Specialist & Manager, Forensic Analyst

What will you learn

More information
  • Create and share threat reports
  • Prepare and launch a threat intelligence program
  • Conduct threat intelligence in a cloud environment
  • Skills for developing a systematic and repeatable threat intelligence program

Terms

Currency
Term
Place
Length
Language
Price without VAT

No results match the specified filters

Loading...

Do you want this course individually?

Let us know!

This course can be customized - either as an individual training 1:1 or for your team. Just leave us your contact and we will contact you with options tailored to your needs.

Successfully sent

We will contact you.

Timeline

1st Day

09:00 – 10:30 Modul 1 - Introduction 
  • Introduction to Treat Inteligence
  • Understanding Cyber Treat Inteligence
  • Overview of Threat Intelligence Lifecycle and Frameworks
10:30 – 10:45 Coffee break
10:45 – 12:15 Module 02 - Cyber Threats and Kill Chain MethodologyUnderstanding Cyber Threats
  • Overview of Cyber Threats
  • Cyber Security Threat Categories
  • Threat Actors/Profiling the Attacker
  • Threat: Intent, Capability, Opportunity Triad
  • Motives, Goals, and Objectives of Cyber Security Attacks
  • Hacking Forums
12:15 – 13:15 Lunch break
13:15 – 14:45 Understanding Advanced Persistent Threats (APTs)
  • Advanced Persistent Threats (APTs)
  • Characteristics of Advanced Persistent Threats (APTs)
  • Advanced Persistent Threat Lifecycle
14:45 – 15:00 Coffee break
15:00 – 17:00 Understanding Cyber Kill Chain
  • Cyber Kill Chain Methodology
  •   Tactics, Techniques, and Procedures (TTPs)
  • Adversary Behavioral Identification
  •  Kill Chain Deep Dive Scenario - Spear Phishing 
Understanding  Indicators of Compromise (IoCs)
  • Indicators of Compromise (IoCs)
  • Why Indicators of Compromise Important?
  • Categories of IoCs
  • Key Indicators of Compromise
  • Pyramid of Pain

2nd Day

09:00 – 10:30 Module 03 - Requirements, Planning, Direction, and Review
  • Understading Organization's Current Threat Landscape
  • Understanding Requirements Analysis
  • Planning Threat Intelligence Program
  • Establishing Management Support
  • Building a Treat Intelligence Team
  • Overwiev a Treat Intelligence Team
  • Overwiev a Treat Intelligence Sharing
10:30 – 10:45 Coffee break
10:45 – 12:15 Reviewing Threat Intelligence Program
  • Threat Intelligence Led Engagement Revie
  •  Considerations for Reviewing Threat Intelligence Program
  •   Assessing the Success and Failure of the Threat Intelligence Program
12:15 – 13:15 Lunch break
13:15 – 14:45 Module 04: Data Collection and Processing
  • Overview of Threat Intelligence Data Collection
  • Overview of Treat Intelligence Collection Management
  • Overview of Threat Intelligence Feeds and Sources
  • Understanding Threat Intelligence Data Collection and Acquisition
14:45 – 15:00 Coffee break
15:00 – 17:00 Data Collection and Processing
  • Understanding Bulk Data Collection
  • Understanding Data Processing and Exploitation

3rd Day

09:00 – 10:30 Module 05: Data Analysis
  • Overwiev of Data Analysis
  • Understading of Data Analysis
  • Understading of Data Analysis Techniques
10:30 – 10:45 Coffee break
10:45 – 12:15 Module 05: Data Analysis
  • Overview of Threat Analysis
  • Understanding Threat Analysis Process
  • Overview of Fine-Tuning Threat Analysis
  • Understanding Threat Intelligence Evaluation
  • Creating Runbooks and Knowledge Base
  • Overwiev of Threat Inteligence Tools
12:15 – 13:15 Lunch break
13:15 – 14:45 Module 06: Intelligence Reporting and Dissemination
  • Overview of Threat Intelligence Reports
  •  Introduction to Dissemination
  • Participating in Sharing Relationships
  • Overview of Sharing Threat Intelligence
  • Overview of Delivery Mechanisms
14:45 – 15:00 Coffee break
15:00 – 17:00 Module 06: Intelligence Reporting and Dissemination
  • Understanding Threat Intelligence Sharing Platforms
  •  Overview of Intelligence Sharing Acts and Regulations
  • Overview of Threat Intelligence Integration
End
  • Block length 90
  • Teaching hours 24
  • Refreshments Yes
  • Exam Yes

This is a highly interactive, comprehensive standardized intensive three-day training program that teaches information security professionals to create professional threat intelligence.

Prestigious certification included

Certified Threat Intelligence Analyst | C|TIA

The C|TIA exam can be taken after completing an official C|TIA course. Candidates who pass the exam will receive C|TIA certificate and membership. Members are obliged to adhere to the principles of the EC Council's continuing education policy.

Certification instructions

Exam format

Time limit: 2 hours

Min. success rate: 70%

Format: Multiple Choice

Number of questions: 50

Online at the EC-Council Exam Portal

Frequently asked questions

All questions

What is EC-Council?

The International Council of E-Commerce Consultants is an international organization specializing in cybersecurity and information technology (IT) certification.

Who is a white hacker?

A white hacker is a person who performs security testing, penetration testing, and other forms of security analysis to discover and fix vulnerabilities and weaknesses in systems, applications, and networks.

Unlike black hackers (hackers who focus on illegal activities such as data theft, malicious hacking, etc.), a white hacker works in accordance with laws and ethical standards.

How does the EC-Council final exam and certification work?

As part of the training, you will get access to virtual laboratories and you will receive an exam voucher. The exam can be taken in three ways:

• computer-based at TAYLLORCOX Campus

• computer-based at the Pearson VUE test center

• computer-based with an online proctor

You will get the results right after completing the exam. If you pass your exam, you will receive your EC-Council certificate within 2-3 working days.