• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

EC-Council Certified Threat Intelligence Analyst (C|TIA)

EC-Council Certified Threat Intelligence Analyst (C|TIA)

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online

  • 3 days

  • All levels

Description

Duration

3 Days

18 CPD hours

This course is intended for

Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.
Ethical Hackers
Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers
Threat Intelligence Analysts, Associates, Researchers, Consultants
Threat Hunters
SOC Professionals
Digital Forensic and Malware Analysts
Incident Response Team Members
Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience.
Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence.
Individuals interested in preventing cyber threats.

Overview

This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks.

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence.

Introduction to Threat Intelligence

  • Understanding Intelligence

  • Understanding Cyber Threat Intelligence

  • Overview of Threat Intelligence Lifecycle and Frameworks

Cyber Threats and Kill Chain Methodology

  • Understanding Cyber Threats

  • Understanding Advanced Persistent Threats (APTs)

  • Understanding Cyber Kill Chain

  • Understanding Indicators of Compromise (IoCs)

Requirements, Planning, Direction, and Review

  • Understanding Organization?s Current Threat Landscape

  • Understanding Requirements Analysis

  • Planning Threat Intelligence Program

  • Establishing Management Support

  • Building a Threat Intelligence Team

  • Overview of Threat Intelligence Sharing

  • Reviewing Threat Intelligence Program

Data Collection and Processing

  • Overview of Threat Intelligence Data Collection

  • Overview of Threat Intelligence Collection Management

  • Overview of Threat Intelligence Feeds and Sources

  • Understanding Threat Intelligence Data Collection and Acquisition

  • Understanding Bulk Data Collection

  • Understanding Data Processing and Exploitation

Data Analysis

  • Overview of Data Analysis

  • Understanding Data Analysis Techniques

  • Overview of Threat Analysis

  • Understanding Threat Analysis Process

  • Overview of Fine-Tuning Threat Analysis

  • Understanding Threat Intelligence Evaluation

  • Creating Runbooks and Knowledge Base

  • Overview of Threat Intelligence Tools

Intelligence Reporting and Dissemination

  • Overview of Threat Intelligence Reports

  • Introduction to Dissemination

  • Participating in Sharing Relationships

  • Overview of Sharing Threat Intelligence

  • Overview of Delivery Mechanisms

  • Understanding Threat Intelligence Sharing Platforms

  • Overview of Intelligence Sharing Acts and Regulations

  • Overview of Threat Intelligence Integration

About The Provider

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK....

Read more about Nexus Human

Tags

Reviews