CourseInfo | SimpliTrain

EC-Council Certified Threat Intelligence Analyst (C|TIA)

Learning plan iconE-Learning

Description

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence.

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence.

This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks.

Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats.

Lesson Id Title Description
1 Introduction to Threat Intelligence Understanding Intelligence
Understanding Cyber Threat Intelligence
Overview of Threat Intelligence Lifecycle and Frameworks
2 Cyber Threats and Kill Chain Methodology Understanding Cyber Threats
Understanding Advanced Persistent Threats (APTs)
Understanding Cyber Kill Chain
Understanding Indicators of Compromise (IoCs)
3 Requirements, Planning, Direction, and Review Understanding Organization’s Current Threat Landscape
Understanding Requirements Analysis
Planning Threat Intelligence Program
Establishing Management Support
Building a Threat Intelligence Team
Overview of Threat Intelligence Sharing
Reviewing Threat Intelligence Program
4 Data Collection and Processing Overview of Threat Intelligence Data Collection
Overview of Threat Intelligence Collection Management
Overview of Threat Intelligence Feeds and Sources
Understanding Threat Intelligence Data Collection and Acquisition
Understanding Bulk Data Collection
Understanding Data Processing and Exploitation
5 Data Analysis Overview of Data Analysis
Understanding Data Analysis Techniques
Overview of Threat Analysis
Understanding Threat Analysis Process
Overview of Fine-Tuning Threat Analysis
Understanding Threat Intelligence Evaluation
Creating Runbooks and Knowledge Base
Overview of Threat Intelligence Tools
6 Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports
Introduction to Dissemination
Participating in Sharing Relationships
Overview of Sharing Threat Intelligence
Overview of Delivery Mechanisms
Understanding Threat Intelligence Sharing Platforms
Overview of Intelligence Sharing Acts and Regulations
Overview of Threat Intelligence Integration