EC-Council Certified Threat Intelligence Analyst – Self-Paced (Incl. Exam Voucher)
Type
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Choose date
R10 400,00
Price excluding VAT
Introduction
EC Council’s Certified Threat Intelligence Analyst (CTIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organisations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialist-level program that teaches a structured approach for building effective threat intelligence.
In the ever-changing threat landscape, CTIA is a highly essential program for those who deal with cyber threats daily. Organisations today demand a professional level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.
This program addresses all the stages involved in the Threat Intelligence Life Cycle, with This attention to a realistic and futuristic approach makes CTIA one of the most comprehensive threat intelligence certifications on the market today. This program provides the solid, professional knowledge that is required for a career in threat intelligence, and enhances your skills as a Threat Intelligence Analyst, increasing your employability. It is desired by most cybersecurity engineers, analysts, and professions from around the world and is respected by hiring authorities.
Audience profile
- Ethical Hackers
- Security Practitioners
- Engineers
- Analysts
- Specialist, Architects, Managers
- Threat Intelligence Analysts, Associates, Researchers, Consultants
- Threat Hunters
- SOC (Security Operations Center) Professionals
- Digital Forensic and Malware Analysts
- Incident Response Team Members
- Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience
- Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence
- Individuals interested in preventing cyber threats
Pre-requisites
The knowledge and skills that a learner must have before attending this course is as follows:
- Minimum of 2 year working experience in Information security
What is EC-Council iLearn?
iLearn is EC Council’s online, self-paced option which means that all of the same modules taught in the live course are recorded and presented in a streaming video format. A certification candidate can set their own learning pace by pausing the lectures and returning to their studies as their schedule permits! This all-inclusive training program provides the benefits of classroom training at your own pace.
What is included?
- Streaming video training modules – 1 year access
- Official EC-Council E-Courseware – 1 year access
- iLabs, Virtual Lab Platform – 6 months access
- One Certification exam voucher
- One Certificate of Attendance
How to Access the iLearn Portal?
All learning resources will be released directly to the delegate and a notification will be shared via email after your booking is complete. You may then login anytime at https://iclass.eccouncil.org/my-courses/
Course objectives
Upon completing this course, the learner will have the following knowledge and skills:
- Key issues plaguing the information security world
- Importance of threat intelligence in risk management, SIEM, and incident response
- Several types of cyber threats, threat actors and their motives, goals, and objectives of cybersecurity attacks
- Fundamentals of threat intelligence (including threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, etc.)
- Cyber kill chain methodology, Advanced Persistent Threat (APT) lifecycle, Tactics, Techniques, and Procedures (TTPs), Indicators of Compromise (IoCs), and pyramid of pain
- Various steps involved in planning a threat intelligence program (Requirements, Planning, Direction, and Review)
- Different types of data feeds, sources, and data collection methods
- Threat intelligence data collection and acquisition through Open Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), and malware analysis
- Bulk data collection and Management (data processing, structuring, normalization, sampling, storing, and visualization)
- Different data analysis types and techniques Including statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)
- Complete threat analysis process which includes threat modelling, fine-tuning, evaluation, runbook, and knowledge base creation
- Different data analysis, threat modelling, and threat intelligence tools
- Threat intelligence dissemination and sharing protocol including dissemination preferences, intelligence collaboration, sharing rules and models, TI exchange types and architectures, participating in sharing relationships, standards, and formats for sharing threat intelligence
- Creating effective threat intelligence reports
- Different threat intelligence sharing platforms, acts, and regulations for sharing strategic, tactical, operational, and technical intelligence
Course content
Module 01: Introduction to Threat Intelligence |
Module 02: Cyber Threats and Kill Chain Methodology |
Module 03: Requirements, Planning, Direction, and Review |
Module 04: Data Collection and Processing |
Module 05: Data Analysis |
Module 06: Intelligence Reporting and Dissemination |
Associated Certifications & Exam
Exam Details | CTIA Exam |
Exam Title | Certified Threat Intelligence Analyst |
Number of Questions/Practical Challenges | 50 Questions |
Test Duration | 2 Hours |
Test Format | Multiple choice questions |
Test Delivery | ECC EXAM portal |
Availability | ECC EXAM |
Exam Prefix | 312-85 (ECC EXAM) |
Passing Score | 70% |
On successful completion of this course students will receive a Torque IT attendance certificate.
Note:
When you attend any authorised EC Council training course at Torque IT you will receive the associated examination voucher as part of your course material. Your certification examination voucher can be used to book and pay for your certification examination at an Authorised EC Council Testing Center (ETC) only. If you are not able to sit your certification examination at Torque IT, and you have no other ETC locally available, you do have the ability to convert your examination voucher into a Pearson VUE examination voucher (Remote Procuring Services), at an additional cost.
EC-Council Overview
To beat a hacker, you need to think like one…
Ethical Hacking is the process of proactively penetrating systems, to which one has official permission to do so, with a view to determining whether vulnerabilities exist and then to undertake the necessary preventive, corrective, and protective countermeasures before an actual compromise to the systems can occur.
Torque IT’s authorised EC-Council training, and associated certification, solutions empower you to identify vulnerabilities and to assess the security posture of target systems. EC-Council certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.
Torque IT being an EC-Council Accredited Training Center (ATC) has been the recipient of EC-Council’s most prestigious ATC of the year awards for 2016, 2014 and EC-Council’s Circle of Excellence Awards for 2015.
These achievements reflect our commitment to providing you with quality skills development, enablement, training, and certification solutions that demonstrate exceptional quality, depth and breadth.