Skip links

Ec-council | Learning

Cyber Threat Information Training | EC-Council iClass

Master the intelligence of threats with the CTIA: learn the latest techniques and strategies to detect, analyze and counter cyber threats.

About the Certified Threat Intelligence Analyst Course

Course outline

Course outline

 

  • Introduction to Threat Intelligence
  • Cybernetic Threats and Attack Frames
  • Requirements, Planning, Management and Review
  • Data collection and processing
  • Data analysis
  • Reports and Dissemination of Intelligence
  • Threat Hunting and Detection
  • Threat Intelligence in SOC Operations, Incident Response and Risk Management
 

Who should attend

  • Threat Intelligence
  • Analysts / Specialists / Professionals / Engineers / Examiners / Associates
  • Threat hunters
  • Specialists / Engineers / Professionals / Associates of Threat Intelligence Platforms
  • Responsible / Architects / Threat Intelligence Leaders / Responsible for Vulnerabilities Management
  • Analysts / Specialists / Professionals in Threat Intelligence SOC
  • Penetration Testers / Ethical Hackers
  • Practitioners / Engineers / Analysts / Specialists / Architects / Security Officers
  • Analysts in Criminalistics and Malware
  • Incident Response Team members
  • Any intermediate to high level cybersecurity professional with a minimum of 3 years experience
  • Individuals of the information security sector wishing to enhance their skills and knowledge in the field of intelligence of cyber threats
  • Individuals interested in preventing cyber threats
 

What You Learn

  • Fundamentals of Threat Intelligence (Types of threat intelligence, life cycle, strategy, capabilities, maturity model, frameworks, platforms, etc.)
  • Various cyber security threats and attack frameworks (Persistent Advanced Threats, Cyber Kill Chain Methodology, ATT&CK MITRE Framework, Diamond Model of Intrusion Analysis, etc.)
  • Different steps involved in planning a threat intelligence program (Requirements, Planning, Management and Review)
  • Different types of intelligence flows of threats, sources, data collection methods
  • Collection and acquisition of threat intelligence data via Open Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counter Intelligence (CCI), Compromission Indicators (IoCs), malware analysis and Python scripting
  • Processing and exploitation of threat intelligence data
  • Threat Data Analysis Techniques (Data Statistics Analysis, Analysis of Concurrent Assumptions (ACH), Structured Analysis of Concurrent Assumptions (SACH), etc.)
  • Comprehensive Threat Analysis Process, which includes threat modelling, fine tuning, evaluation, and the creation of operating manuals and knowledge bases
  • How to Create and Share Threat Intelligence Reports
  • Sharing and collaborating in threat intelligence using Python scripting
  • Different platforms, laws and regulations for intelligence sharing
  • How to perform threat intelligence in a cloud environment
  • Fundamentals of Threat Hunting (Types of threat hunt, process, loop, methodology, etc.)
  • Automation of threat hunting using Python scripting
  • Threat Intelligence in SOC Operations, Incident Response and Risk Management
 

Review

Success Note

In order to maintain the high integrity of our certification examinations, EC-Council examinations are provided in several forms (i.e. different question banks). Each form is carefully analysed through beta tests with an appropriate sampling group under the supervision of a committee of experts in the field who ensure that each of our examinations has not only academic rigour but also applicability in the "real world". We also have a process to determine the level of difficulty of each issue. The individual mark then contributes to a global "Cut Score" for each form of examination. To ensure that each form has equal evaluation standards, cutting scores are set on a "by examination" basis. Depending on the form of examination chosen, cutting scores can vary from 60% to 78%.

Title of Review: Certified Threat Intelligence Analyst

Review Code: 312-85

Number of Questions: 50

Duration: 2 hours

Availability: ECC Examination Portal

Roles

  • Cyber Threat Intelligence Analyst
  • Cybernetic Threat Hunter
  • Partner / Researcher / Cyber Threat Intelligence Consultant
  • Cyber Security Threat Intelligence Analyst / Information Security
  • Engineer / Specialist / Manager / Intelligence Manager Cyber Threats
  • SOC Threat Intelligence Analyst
  • Senior Intelligence Analyst for Cybercrime Threats
  • Associate Director of Threat Management
  • Project Leader / Director of Threat Intelligence

The most comprehensive CTIA package on the market!

the CTIA, which includes all of the following:

Online course for one year

Examination voucher

Official laboratories for 6 months

Preparation for examination

This website uses cookies to improve your web experience.
EnglishenEnglishEnglish
0