EC-Council Certified Threat Intelligence Analyst (CTIA)

Cybersecurity

COURSE OVERVIEW


The EC-Council Certified Threat Intelligence Analyst (CTIA) is a comprehensive specialist- level program that teaches a structured approach for building effective threat intelligence.

A program developed by threat intelligence experts from all over the world that is constantly updated to ensure that the students are exposed to the latest advances in the field of Threat Intelligence.


Duration: 3 days / 24 hours

Delivery Method: Classroom-based, Virtual Instructor Led Training


WHO SHOULD ATTEND

·      Threat Intelligence

·      Analysts/Specialists/Professionals/Engineers/Examiners/Associates

·      Threat Hunters

·      Threat Intelligence Platform Specialists/Engineers/Professionals/Associates

·      Threat Intelligence Managers/Architects/Leads/Vulnerability Management Managers

·      SOC Threat Intelligence Analyst/Specialists/Professionals

·      Pen Testers/Ethical Hackers

·      Security Practitioners/Engineers/Analysts/Specialists/Architects/Managers

·      Digital Forensic and Malware Analysts

·      Incident Response Team Members

·      Any mid-level to high-level cybersecurity professionals with a minimum of 3 years of experience

·      Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence

·      Individuals interested in preventing cyber threats

 

WHAT YOU WILL LEARN

·      Fundamentals of threat intelligence (Threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, platforms, etc.)

·      Various cyber security threats and attack frameworks (Advanced Persistent Threats, Cyber Kill Chain Methodology, MITRE ATT&CK Framework, Diamond Model of Intrusion Analysis, etc.)

·      Various steps involved in planning a threat intelligence program (Requirements, Planning, Direction, and Review)

·      Different types of threat intelligence feeds, sources, data collection methods

·      Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), malware analysis, and Python scripting

·      Threat intelligence data processing and exploitation

·      Threat data analysis techniques (Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)

·      Complete threat analysis process, which includes threat modeling, fine-tuning, evaluation, and runbook and knowledge base creation

·      How to create and share threat intelligence reports

·      Threat intelligence sharing and collaboration using Python scripting

·      Different platforms, acts, and regulations for sharing intelligence

·      How to perform threat intelligence in a cloud environment

·      Fundamentals of threat hunting (Threat hunting types, process, loop, methodology, etc.)

·      Threat-hunting automation using Python scripting

·      Threat intelligence in SOC operations, incident response, and risk management

COURSE OUTLINE


Module 01: Introduction to Threat Intelligence

o  Understand Intelligence

o  Summarize Cyber Threat Intelligence Concepts

o  Explain Threat Intelligence Lifecycle and Framework

o  Understand Threat Intelligence Platforms (TIPs)

o  Understand Threat Intelligence in the Cloud Environment

o  Understand Future Trends and Continuous Learning


Module 02: Cyber Threats and Attack Frameworks

o  Understand Cyber Threats

o  Explain Advanced Persistent Threats

o  Explain Cyber Kill Chain

o  Explain MITRE ATT&CK and Diamond Model

o  Understand Indicators of Compromise


Module 03: Requirements, Planning, Direction, and Review

o  Understand the Organization’s Current Threat Landscape

o  Understand Requirements Analysis

o  Plan a Threat Intelligence Program

o  Establish Management Support

o  Build a Threat Intelligence Team

o  Understand Threat Intelligence Sharing

o  Review Threat Intelligence Program


Module 04: Data Collection and Processing

o  Understand Threat Intelligence Data Collection

o  Summarize Threat Intelligence Collection Management

o  Explain Threat Intelligence Feeds and Sources

o  Explain Threat Intelligence Data Collection and Acquisition

o  Understand Bulk Data Collection

o  Explain Data Processing and Exploitation

o  Understand Threat Data Collection and Enrichment in Cloud Environments


Module 05: Data Analysis

o  Summarize Data Analysis

o  Explain Data Analysis Techniques

o  Understand Threat Analysis

o  Demonstrate Threat Analysis Process

o  Explain Fine-tuning Threat Analysis

o  Understand Threat Intelligence Evaluation

o  Create Runbooks and Knowledge Base

o  Use Threat Intelligence Tools


Module 06: Intelligence Reporting and Dissemination

o  Understand Threat Intelligence Reports

o  Understand Dissemination

o  Participate in Sharing Relationships

o  Understand Sharing Threat Intelligence

o  Explain Delivery Mechanisms

o  Use Threat Intelligence Sharing Platforms

o  Understand Intelligence Sharing Acts and Regulations

o  Explain Threat Intelligence Integration

o  Understand Intelligence Sharing and Collaboration using Python Scripting


Module 07: Threat Hunting and Detection

o  Summarize Threat Hunting Concepts

o  Understand Threat Hunting Automation


Module 08: Threat Intelligence in SOC Operations, Incident Response, and Risk Management

o  Understand Threat Intelligence in SOC Operations

o  Understand Threat Intelligence in Risk Management

o  Understand Threat Intelligence in Incident Response

Learning Experience Survey

Learning Experience Survey

Learning Experience Survey


REGISTER NOW