Certified Threat Intelligence Analyst | CTIA

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats.

Virtual Training or e-Learning?

We offer flexibility. You can choose from our selection of in-class courses as well as online courses.

Try a live virtual course

Target Group

This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. 

  • Threat Hunters
  • SOC Professionals
  • CIO, Security Manager
  • Network security & Site administrators
  • Individuals interested in preventing cyber threats
  • Computer Network Auditor (CNA),  Analyst (CNA), Defence (CND)
  • Infrastructure Support, IS/IT Specialist & Manager, Forensic Analyst
Target Group

What is C|TIA

C|TIA is a method-driven program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.

What is C|TIA

Course Objectives

  • To differentiate threat intelligence professionals from other information security professionals
  • To enable individuals and organizations with the ability to prepare and run a threat intelligence program 
  • To provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability
  • To ensure that organizations have predictive capabilities rather than just proactive measures beyond active defense mechanism
  • To empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program

Certification

The C|TIA exam can be challenged post the completion of attending the complete official C|TIA course. Candidates that successfully pass the exam will receive their C|TIA certificate and membership privileges. Members are required to adhere to the policies of EC-Council’s Continuing Education Policy.

Certification

Agenda

Day 1
Hide agenda
Open agenda

09:00 – 10:30

Modul 1 - Introduction 

  • Introduction to Treat Inteligence
  • Understanding Cyber Treat Inteligence
  • Overview of Threat Intelligence Lifecycle and Frameworks

10:30 – 10:45

Coffee break

10:45 – 12:15

Module 02 - Cyber Threats and Kill Chain Methodology

Understanding Cyber Threats

  • Overview of Cyber Threats
  • Cyber Security Threat Categories
  • Threat Actors/Profiling the Attacker
  • Threat: Intent, Capability, Opportunity Triad
  • Motives, Goals, and Objectives of Cyber Security Attacks
  • Hacking Forums

12:15 – 13:15

Lunch Menu

13:15 – 14:45

Understanding Advanced Persistent Threats (APTs)

  • Advanced Persistent Threats (APTs)
  • Characteristics of Advanced Persistent Threats (APTs)
  • Advanced Persistent Threat Lifecycle

14:45 – 15:00

Coffee break

15:00 – 17:00

Understanding Cyber Kill Chain

  • Cyber Kill Chain Methodology
  •   Tactics, Techniques, and Procedures (TTPs)
  • Adversary Behavioral Identification
  •  Kill Chain Deep Dive Scenario - Spear Phishing 

Understanding  Indicators of Compromise (IoCs)

  • Indicators of Compromise (IoCs)
  • Why Indicators of Compromise Important?
  • Categories of IoCs
  • Key Indicators of Compromise
  • Pyramid of Pain

Day 2
Hide agenda
Open agenda

09:00 – 10:30

Module 03 - Requirements, Planning, Direction, and Review

  • Understading Organization's Current Threat Landscape
  • Understanding Requirements Analysis
  • Planning Threat Intelligence Program
  • Establishing Management Support
  • Building a Treat Intelligence Team
  • Overwiev a Treat Intelligence Team
  • Overwiev a Treat Intelligence Sharing

10:30 – 10:45

Coffee break

10:45 – 12:15

Reviewing Threat Intelligence Program

  • Threat Intelligence Led Engagement Revie
  •  Considerations for Reviewing Threat Intelligence Program
  •   Assessing the Success and Failure of the Threat Intelligence Program

12:15 – 13:15

Lunch Menu

13:15 – 14:45

Module 04: Data Collection and Processing

  • Overview of Threat Intelligence Data Collection
  • Overview of Treat Intelligence Collection Management
  • Overview of Threat Intelligence Feeds and Sources
  • Understanding Threat Intelligence Data Collection and Acquisition

14:45 – 15:00

Coffee break

15:00 – 17:00

Data Collection and Processing

  • Understanding Bulk Data Collection
  • Understanding Data Processing and Exploitation

Day 3
Hide agenda
Open agenda

09:00 – 10:30

Module 05: Data Analysis

  • Overwiev of Data Analysis
  • Understading of Data Analysis
  • Understading of Data Analysis Techniques

10:30 – 10:45

Coffee Break 

10:45 – 12:15

  • Overview of Threat Analysis
  • Understanding Threat Analysis Process
  • Overview of Fine-Tuning Threat Analysis
  • Understanding Threat Intelligence Evaluation
  • Creating Runbooks and Knowledge Base
  • Overwiev of Threat Inteligence Tools

12:15 – 13:15

Lunch Menu

13:15 – 14:45

Module 06: Intelligence Reporting and Dissemination

  • Overview of Threat Intelligence Reports
  •  Introduction to Dissemination
  • Participating in Sharing Relationships
  • Overview of Sharing Threat Intelligence
  • Overview of Delivery Mechanisms

14:45 – 15:00

Coffee break

15:00 – 17:00

  • Understanding Threat Intelligence Sharing Platforms
  •  Overview of Intelligence Sharing Acts and Regulations
  • Overview of Threat Intelligence Integration

End

It is a highly interactive, comprehensive, standards-based, intensive 3-day training program that teaches information security professionals to build professional threat intelligence.

  • Block duration 45 minutes
  • Hours 24 hours
  • Refreshments Yes
  • Exam Yes
  • Prerequisites

    None

Exam Format

C|TIA allows cybersecurity professionals to demonstrate their mastery of the knowledge and skills required for threat intelligence 

  • Duration: 2 hours
  • Passing Score: 70%
  • Number of Questions: 50
  • Test Format: Multiple Choice
  • Availability: EC-Council Exam Portal
Exam Format

Graduate ratings

What makes our references exceptional? They are not one-off events. Clients come back to us regularly.

View the full list of reference clients.

Your rating
*****

Not sure if this is the right courese for you? Get in touch!

For assistance please give us a call.

We are available at +420 222 553 101 Always Monday to Friday: 9am - 5pm.

*items marked with an asterisk are mandatory

Would you like a gift for your birtday?