Certified Threat Intelligence Analyst (CTIA)

The Certified Threat Intelligence Analyst (CTIA) certification is a credentialing certification and training program created in collaboration with experts in the field of threat intelligence and cybersecurity. This certification shows that you have the skills necessary to identify and mitigate security risks from threats. It is a specialist level training and certification, and the CTIA certified candidates have a competitive edge over other information security professionals.
Course Prerequisites
Basic Computer Knowledge.
Module 01: Introduction to Threat Intelligence
Understanding Intelligence
Understanding Cyber Threat Intelligence
Overview of Threat Intelligence Lifecycle and Frameworks
Module 02: Cyber Threats and Kill Chain Methodology
Understanding Cyber Threats
Understanding Advanced Persistent Threats (APTs)
Understanding Cyber Kill Chain
Understanding Indicators of Compromise (IoCs)
Module 03: Requirements, Planning, Direction, and Review
Understanding Organization’s Current Threat Landscape
Understanding Requirements Analysis
Planning Threat Intelligence Program
Establishing Management Support
Building a Threat Intelligence Team
Overview of Threat Intelligence Sharing
Reviewing Threat Intelligence Program
Module 04: Data Collection and Processing
Overview of Threat Intelligence Data Collection
Overview of Threat Intelligence Collection Management
Overview of Threat Intelligence Feeds and Sources
Understanding Threat Intelligence Data Collection and Acquisition
Understanding Bulk Data Collection
Understanding Data Processing and Exploitation
Module 05: Data Analysis
Overview of Data Analysis
Understanding Data Analysis Techniques
Overview of Threat Analysis
Understanding Threat Analysis Process
Overview of Fine-Tuning Threat Analysis
Understanding Threat Intelligence Evaluation
Creating Runbooks and Knowledge Base
Overview of Threat Intelligence Tools
Module 06: Intelligence Reporting and Dissemination
Overview of Threat Intelligence Reports
Introduction to Dissemination
Participating in Sharing Relationships
Overview of Sharing Threat Intelligence
Overview of Delivery Mechanisms
Understanding Threat Intelligence Sharing Platforms
Overview of Intelligence Sharing Acts and Regulations
Overview of Threat Intelligence Integration

You will learn:

 Module 1: Introduction to Threat Intelligence
  • Understanding Intelligence
  • Understanding Cyber Threat Intelligence
  • Overview of Threat Intelligence Lifecycle and Frameworks
 Module 2: Cyber Threats and Kill Chain Methodology
  • Understanding Cyber Threats
  • Understanding Advanced Persistent Threats (APTs)
  • Understanding Cyber Kill Chain
  • Understanding Indicators of Compromise (IoCs)
 Module 3: Requirements, Planning, Direction, and Review
  • Understanding Organization’s Current Threat Landscape
  • Understanding Requirements Analysis
  • Planning Threat Intelligence Program
  • Establishing Management Support
  • Building a Threat Intelligence Team
  • Overview of Threat Intelligence Sharing
  • Reviewing Threat Intelligence Program
 Module 4: Data Collection and Processing
  • Overview of Threat Intelligence Data Collection
  • Overview of Threat Intelligence Collection Management
  • Overview of Threat Intelligence Feeds and Sources
  • Understanding Threat Intelligence Data Collection and Acquisition
  • Understanding Bulk Data Collection
  • Understanding Data Processing and Exploitation
 Module 5: Data Analysis
  • Overview of Data Analysis
  • Understanding Data Analysis Techniques
  • Overview of Threat Analysis
  • Understanding Threat Analysis Process
  • Overview of Fine-Tuning Threat Analysis
  • Understanding Threat Intelligence Evaluation
  • Creating Runbooks and Knowledge Base
  • Overview of Threat Intelligence Tools
 Module 6: Dissemination and Reporting of Intelligence
  • Overview of Threat Intelligence Reports
  • Introduction to Dissemination
  • Participating in Sharing Relationships
  • Overview of Sharing Threat Intelligence
  • Overview of Delivery Mechanisms
  • Understanding Threat Intelligence Sharing Platforms
  • Overview of Intelligence Sharing Acts and Regulations
  • Overview of Threat Intelligence Integration
Certified Threat Intelligence Analyst (CTIA) Course Overview Certified Threat Intelligence Analyst (CTIA) is mixture of cybersecurity and risk intelligence to assist discover and mitigate enterprise dangers through changing unknown inner and outside threats into acknowledged threats. It is a comprehensive, specialist-degree software that teaches a established method for constructing powerful risk intelligence.

Reviews

There are no reviews yet.

Write a review

Your email address will not be published. Required fields are marked *

Your review must be at least 50 characters.
$649$1,849
Clear

What’s included