Certified Threat Intelligence Analyst (CTIA) Course

  • Home
  • Certified Threat Intelligence Analyst (CTIA)

Certified Threat Intelligence Analyst (CTIA) Course Description

Certified Threat Intelligence Analyst (CTIA) from EC-Council is a credentialing certification and training program. This highly valued certification has been exclusively devised in collaboration with threat intelligence and cybersecurity experts worldwide to empower organizations effectively to identify and mitigate security risks with extensive processing and analysis of available threat information. The CTIA is a specialist level training and certification that demonstrates security professionals the structured approach to acquiring threat intelligence. The CTIA certified candidates attain a competitive edge over other information security professionals. This threat intelligence certification course delivers standards-based, intensive practical skills to the most essentially required threat intelligence across information security.

Image
Target Audience
  1. This certification is designed to upskill:
  2. Security professionals and ethical hackers
  3. Security Analysts and architects
  4. SOC professionals, cybersecurity forensic experts and malware analysts
  5. Security consultants and threat hunters
Pre-Requisites
  1. Working experience of minimum 2 years in information security

Exam Information
  1. To become a Certified Threat Intelligence Analyst (CTIA), you need to pass the following certification exam:
  2. Certification Name    Certified Threat Intelligence Analyst Exam Code 312-85
  3. Test Format    Multiple choice questions
  4. Number of Questions    50
  5. Test Duration    2 hours
  6. Passing Score    70%
CTIA Course Objectives
This Certified Threat Intelligence Analyst training and certification aim to explain expertly:

  1. Primary issues threatening the information security world
  2. Role of threat intelligence
  3. Implementing threat intelligence in risk management, incident response, and SIEM
  4. Cyber threats and threat factors
  5. Objectives of diverse cybersecurity attacks
  6. Basics of threat intelligence including types, capabilities, strategy, lifecycle, maturity model, and frameworks
  7. Implementing the cyber kill chain methodology
  8. Advanced Persistent Threat (APT) lifecycle
  9. Tactics, Techniques, and Procedures (TTPs)
  10. Indicators of Compromise (IOS) and the pyramid of pain
  11. Steps to Planning a threat intelligence program including taking requirements, planning, directing, and review
  12. Types of data feeds and methods to collect data
  13. Threat intelligence data collection by using Cyber Counterintelligence (CCI), Open Source Intelligence (OSINT), Human Intelligence (HUMINT), and Indicators of Compromise (IOS)
  14. Bulk data collection, data structuring, processing, normalizing, sampling, storing, and creating visualizations
  15. Types of data analysis techniques such as Statistical Data Analysis, Analysis Structured Analysis of Competing Hypotheses (SACH), and of Competing Hypotheses (ACH)
  16. Threat analysis process including threat modeling, evaluation, fine-tuning, creating a knowledge base and runbook
  17. Threat intelligence dissemination, dissemination preferences
  18. Intelligence collaboration and Malware analysis
  19. Types of TI exchange and threat intelligence sharing formats
  20. Tools for threat intelligence, threat modeling, data analysis
  21. Disseminating threat intelligence and sharing protocols, dissemination preferences, sharing rules and models, intelligence collaboration
  22. TI exchange architecture and types, sharing relationships
  23. threat intelligence standards and formats for sharing
  24. Threat intelligence reporting
  25. Platforms and regulations to share operational, strategic, tactical, and technical intelligence

Copyright 2022 Seqty. Designed By Senselearner