Certified Threat Intelligence
Analyst (CTIA) Course Description
Certified
Threat Intelligence Analyst (CTIA) from EC-Council is a
credentialing certification and training program. This
highly valued certification has been exclusively devised in
collaboration with threat intelligence and cybersecurity
experts worldwide to empower organizations effectively to
identify and mitigate security risks with extensive
processing and analysis of available threat information. The
CTIA is a specialist level training and certification that
demonstrates security professionals the structured approach
to acquiring threat intelligence. The CTIA certified
candidates attain a competitive edge over other information
security professionals. This threat intelligence
certification course delivers standards-based, intensive
practical skills to the most essentially required threat
intelligence across information security.
- To become a Certified Threat Intelligence Analyst (CTIA),
you need to pass the following certification exam:
- Certification Name Certified Threat
Intelligence Analyst Exam Code 312-85
- Test Format Multiple choice questions
- Number of Questions 50
- Test Duration 2 hours
- Passing Score 70%
CTIA Course Objectives
This Certified Threat Intelligence Analyst training and
certification aim to explain expertly:
- Primary issues threatening the information security world
- Role of threat intelligence
- Implementing threat intelligence in risk management,
incident response, and SIEM
- Cyber threats and threat factors
- Objectives of diverse cybersecurity attacks
- Basics of threat intelligence including types,
capabilities, strategy, lifecycle, maturity model, and
frameworks
- Implementing the cyber kill chain methodology
- Advanced Persistent Threat (APT) lifecycle
- Tactics, Techniques, and Procedures (TTPs)
- Indicators of Compromise (IOS) and the pyramid of pain
- Steps to Planning a threat intelligence program including
taking requirements, planning, directing, and review
- Types of data feeds and methods to collect data
- Threat intelligence data collection by using Cyber
Counterintelligence (CCI), Open Source Intelligence (OSINT),
Human Intelligence (HUMINT), and Indicators of Compromise
(IOS)
- Bulk data collection, data structuring, processing,
normalizing, sampling, storing, and creating visualizations
- Types of data analysis techniques such as Statistical Data
Analysis, Analysis Structured Analysis of Competing
Hypotheses (SACH), and of Competing Hypotheses (ACH)
- Threat analysis process including threat modeling,
evaluation, fine-tuning, creating a knowledge base and
runbook
- Threat intelligence dissemination, dissemination
preferences
- Intelligence collaboration and Malware analysis
- Types of TI exchange and threat intelligence sharing
formats
- Tools for threat intelligence, threat modeling, data
analysis
- Disseminating threat intelligence and sharing protocols,
dissemination preferences, sharing rules and models,
intelligence collaboration
- TI exchange architecture and types, sharing relationships
- threat intelligence standards and formats for sharing
- Threat intelligence reporting
- Platforms and regulations to share operational, strategic,
tactical, and technical intelligence