top of page
Blue Background

Certified Threat Intelligence Analyst (CTIA)

 

Certified Threat Intelligence Analyst (CTIA)

 

Duration : 5 Days

 

Overview

 

Certified Threat Intelligence Analyst (CTIA) from EC-Council is a credentialing certification and training

program. This highly valued certification has been exclusively devised in collaboration with threat

intelligence and cybersecurity experts worldwide to empower organizations effectively to identify and

mitigate security risks with extensive processing and analysis of available threat information. The CTIA is a specialist level training and certification that demonstrates security professionals the structured

approach to acquiring threat intelligence. The CTIA certified candidates attain a competitive edge over

other information security professionals. This threat intelligence certification course delivers standards[1]based, intensive practical skills to the most essentially required threat intelligence across information

security.

 

Course Outline:

 

This Certified Threat Intelligence Analyst training and certification aim to explain expertly:

 

  • Primary issues threatening the information security world

  • Role of threat intelligence

  • Implementing threat intelligence in risk management, incident response, and SIEM

  • Cyber threats and threat factors

  • Objectives of diverse cybersecurity attacks

  • Basics of threat intelligence including types, capabilities, strategy, lifecycle, maturity model,and frameworks

  • Implementing the cyber kill chain methodology

  • Advanced Persistent Threat (APT) lifecycle

  • Tactics, Techniques, and Procedures (TTPs)

  • Indicators of Compromise (IOS) and the pyramid of pain

  • Steps to Planning a threat intelligence program including taking requirements, planning,directing, and review

  • Types of data feeds and methods to collect data

  • Threat intelligence data collection by using Cyber Counterintelligence (CCI), Open Source

  • Intelligence (OSINT), Human Intelligence (HUMINT), and Indicators of Compromise (IOS)

  • Bulk data collection, data structuring, processing, normalizing, sampling, storing, and creating

  • Types of data analysis techniques such as Statistical Data Analysis, Analysis Structured Analysis

       of Competing Hypotheses (SACH), and of Competing Hypotheses (ACH)

  • Threat analysis process including threat modeling, evaluation, fine-tuning, creating a knowledge base and runbook

  • Threat intelligence dissemination, dissemination preferences

  • Intelligence collaboration and Malware analysis

  • Types of TI exchange and threat intelligence sharing formats

  • Tools for threat intelligence, threat modeling, data analysis

  • Disseminating threat intelligence and sharing protocols, dissemination preferences, sharing

       rules and models, intelligence collaboration

  • TI exchange architecture and types, sharing relationships

  • threat intelligence standards and formats for sharing

  • Threat intelligence reporting

  • Platforms and regulations to share operational, strategic, tactical, and technical intelligence

 

Pre-requisites

 

Working experience of minimum 2 years in information security

 

Target Audience

 

This certification is designed to upskill:

 

Security professionals and ethical hackers

Security Analysts and architects

SOC professionals, cybersecurity forensic experts and malware analysts

Security consultants and threat hunters

bottom of page