Ec-council | Learning
Cyber Threat Information Training | EC-Council iClass
Master the intelligence of threats with the CTIA: learn the latest techniques and strategies to detect, analyze and counter cyber threats.
About the Certified Threat Intelligence Analyst Course
Course outline
Course outline
- Introduction to Threat Intelligence
- Cybernetic Threats and Attack Frames
- Requirements, Planning, Management and Review
- Data collection and processing
- Data analysis
- Reports and Dissemination of Intelligence
- Threat Hunting and Detection
- Threat Intelligence in SOC Operations, Incident Response and Risk Management
Who should attend
- Threat Intelligence
- Analysts / Specialists / Professionals / Engineers / Examiners / Associates
- Threat hunters
- Specialists / Engineers / Professionals / Associates of Threat Intelligence Platforms
- Responsible / Architects / Threat Intelligence Leaders / Responsible for Vulnerabilities Management
- Analysts / Specialists / Professionals in Threat Intelligence SOC
- Penetration Testers / Ethical Hackers
- Practitioners / Engineers / Analysts / Specialists / Architects / Security Officers
- Analysts in Criminalistics and Malware
- Incident Response Team members
- Any intermediate to high level cybersecurity professional with a minimum of 3 years experience
- Individuals of the information security sector wishing to enhance their skills and knowledge in the field of intelligence of cyber threats
- Individuals interested in preventing cyber threats
What You Learn
- Fundamentals of Threat Intelligence (Types of threat intelligence, life cycle, strategy, capabilities, maturity model, frameworks, platforms, etc.)
- Various cyber security threats and attack frameworks (Persistent Advanced Threats, Cyber Kill Chain Methodology, ATT&CK MITRE Framework, Diamond Model of Intrusion Analysis, etc.)
- Different steps involved in planning a threat intelligence program (Requirements, Planning, Management and Review)
- Different types of intelligence flows of threats, sources, data collection methods
- Collection and acquisition of threat intelligence data via Open Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counter Intelligence (CCI), Compromission Indicators (IoCs), malware analysis and Python scripting
- Processing and exploitation of threat intelligence data
- Threat Data Analysis Techniques (Data Statistics Analysis, Analysis of Concurrent Assumptions (ACH), Structured Analysis of Concurrent Assumptions (SACH), etc.)
- Comprehensive Threat Analysis Process, which includes threat modelling, fine tuning, evaluation, and the creation of operating manuals and knowledge bases
- How to Create and Share Threat Intelligence Reports
- Sharing and collaborating in threat intelligence using Python scripting
- Different platforms, laws and regulations for intelligence sharing
- How to perform threat intelligence in a cloud environment
- Fundamentals of Threat Hunting (Types of threat hunt, process, loop, methodology, etc.)
- Automation of threat hunting using Python scripting
- Threat Intelligence in SOC Operations, Incident Response and Risk Management
Review
Success Note
In order to maintain the high integrity of our certification examinations, EC-Council examinations are provided in several forms (i.e. different question banks). Each form is carefully analysed through beta tests with an appropriate sampling group under the supervision of a committee of experts in the field who ensure that each of our examinations has not only academic rigour but also applicability in the "real world". We also have a process to determine the level of difficulty of each issue. The individual mark then contributes to a global "Cut Score" for each form of examination. To ensure that each form has equal evaluation standards, cutting scores are set on a "by examination" basis. Depending on the form of examination chosen, cutting scores can vary from 60% to 78%.
Title of Review: Certified Threat Intelligence Analyst
Review Code: 312-85
Number of Questions: 50
Duration: 2 hours
Availability: ECC Examination Portal
Roles
- Cyber Threat Intelligence Analyst
- Cybernetic Threat Hunter
- Partner / Researcher / Cyber Threat Intelligence Consultant
- Cyber Security Threat Intelligence Analyst / Information Security
- Engineer / Specialist / Manager / Intelligence Manager Cyber Threats
- SOC Threat Intelligence Analyst
- Senior Intelligence Analyst for Cybercrime Threats
- Associate Director of Threat Management
- Project Leader / Director of Threat Intelligence


