EC-Council Certified Threat Intelligence Analyst (CTIA)

 

Course Overview

C|TIA is designed for individuals who are involved in the collection, analysis, and dissemination of threat intelligence information. It covers a range of topics, including the fundamentals of threat intelligence, the use of threat intelligence tools and techniques, and the development of a threat intelligence program.

Who should attend

  • Cyber Threat Intelligence Analyst
  • Cyber Threat Hunter
  • Cyber Threat Intelligence Associate/Researcher/Consultant
  • Cybersecurity/Information Security Threat Intelligence Analyst
  • Cyber Threat Intelligence Engineer/Specialist/Lead/Manager
  • SOC Threat Intelligence Analyst
  • Principal Cybercrime Threat Intelligence Analyst
  • Threat Management Associate Director
  • Project Manager/Director of Threat Intelligence

Prerequisites

  • Any Mid-level to high-level cybersecurity professionals with a minimum of 3 years of experience.
  • Individuals with EC-Council’s recognized C|EH and C|ND certifications can enroll for this course.

Course Objectives

  • Fundamentals of threat intelligence (Threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, platforms, etc.)
  • Various cyber security threats and attack frameworks (Advanced Persistent Threats, Cyber Kill Chain Methodology, MITRE ATT&CK Framework, Diamond Model of Intrusion Analysis, etc.)
  • Various steps involved in planning a threat intelligence program (Requirements, planning, direction, and review)
  • Different types of threat intelligence feeds, sources, data collection methods
  • Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), Malware Analysis, and Python Scripting
  • Threat intelligence data processing and exploitation
  • Threat data analysis techniques (Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)
  • Complete threat analysis process, which includes threat modeling, fine-tuning, evaluation, and runbook and knowledge base creation
  • How to create and share threat intelligence reports
  • Threat intelligence sharing and collaboration using Python scripting
  • Different platforms, acts, and regulations for sharing intelligence
  • How to perform threat intelligence in a cloud environment
  • Fundamentals of threat hunting (Threat hunting types, process, loop, methodology, etc.)
  • Threat-hunting automation using Python scripting
  • Threat intelligence in SOC operations, incident response, and risk management

Course Content

  • Module 01: Introduction to Threat Intelligence
  • Module 02: Cyber Threats and Attack Frameworks
  • Module 03: Requirements, Planning, Direction, and Review
  • Module 04: Data Collection and Processing
  • Module 05: Data Analysis
  • Module 06: Intelligence Reporting and Dissemination
  • Module 07: Threat Hunting and Detection
  • Module 08: Threat Intelligence in SOC Operations, Incident Response, and Risk Management

Prices & Delivery methods

Online Training

Duration
3 days

Price
  • on request
Classroom Training

Duration
3 days

Price
  • on request

Click on town name or "Online Training" to book Schedule

Germany

Krefeld
Online Training Time zone: Central European Time (CET) Course language: German Guaranteed date!
Online Training Time zone: Central European Summer Time (CEST) Course language: English
Hamburg

Slovenia

Online Training Time zone: Central European Time (CET) Course language: English
Online Training Time zone: Central European Summer Time (CEST) Course language: English
Online Training Time zone: Central European Summer Time (CEST) Course language: English
Online Training Time zone: Central European Time (CET) Course language: English

Switzerland

Zurich
Zurich
Zurich
Zurich
Zurich
Zurich
Guaranteed date:   iTLS will carry out all guaranteed training regardless of the number of attendees, exempt from force majeure or other unexpected events, like e.g. accidents or illness of the trainer, which prevent the course from being conducted.
Instructor-led Online Training:   This computer icon in the schedule indicates that this date/time will be conducted as Instructor-Led Online Training.
This is a FLEX course, which is delivered both virtually and in the classroom.