Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence.

starstarstarstarstar_half

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks.

1
  • Introduction to Threat Intelligence

  • Understanding Intelligence
    Understanding Cyber Threat Intelligence
    Overview of Threat Intelligence Lifecycle and Frameworks

2
  • Cyber Threats and Kill Chain Methodology

  • Understanding Cyber Threats
    Understanding Advanced Persistent Threats (APTs)
    Understanding Cyber Kill Chain
    Understanding Indicators of Compromise (IoCs)

3
  • Requirements, Planning, Direction, and Review

  • Understanding Organization’s Current Threat Landscape
    Understanding Requirements Analysis
    Planning Threat Intelligence Program
    Establishing Management Support
    Building a Threat Intelligence Team
    Overview of Threat Intelligence Sharing
    Reviewing Threat Intelligence Program

4
  • Data Collection and Processing

  • Overview of Threat Intelligence Data Collection
    Overview of Threat Intelligence Collection Management
    Overview of Threat Intelligence Feeds and Sources
    Understanding Threat Intelligence Data Collection and Acquisition
    Understanding Bulk Data Collection
    Understanding Data Processing and Exploitation

5
  • Data Analysis

  • Overview of Data Analysis
    Understanding Data Analysis Techniques
    Overview of Threat Analysis
    Understanding Threat Analysis Process
    Overview of Fine-Tuning Threat Analysis
    Understanding Threat Intelligence Evaluation
    Creating Runbooks and Knowledge Base
    Overview of Threat Intelligence Tools

6
  • Intelligence Reporting and Dissemination

  • Overview of Threat Intelligence Reports
    Introduction to Dissemination
    Participating in Sharing Relationships
    Overview of Sharing Threat Intelligence
    Overview of Delivery Mechanisms
    Understanding Threat Intelligence Sharing Platforms
    Overview of Intelligence Sharing Acts and Regulations
    Overview of Threat Intelligence Integration

Audience

Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. This course benefits, Ethical Hackers. Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers, Threat Intelligence Analysts, Associates, Researchers, Consultants, Threat Hunters, SOC Professionals, Digital Forensic and Malware Analysts, Incident Response Team Members, any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience, Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence, Individuals interested in preventing cyber threats.

Language

English

Prerequisites

While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training.

$2,625

Length: 3.0 days (24 hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...