Certified Threat Intelligence Analyst (CTIA)

C|TIA is a method-driven course that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.

EC-Council
Certified Threat Intelligence Analyst (CTIA)
$699.00
Secure checkoutEncrypted payment
Expecting Something More ?

Program Features

  • Self-paced
  • Blockchain-based Certificate
Expecting Something More ?

Program Features

  • Self-paced
  • Blockchain-based Certificate

Description

C|TIA is a method-driven course that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks. 


The Purpose of C|TIA is:

  • To enable individuals and organizations with the ability to prepare and run a threat intelligence program that allows ‘evidence-based knowledge’ and provides ‘actionable advice’ about ‘existing and unknown threats’.
  • To ensure that organizations have predictive capabilities rather than just proactive measures beyond active defense mechanism.
  • To empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program.
  • To differentiate threat intelligence professionals from other information security professionals.
  • For individuals: To provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability.




Students who successfully complete this class will be able to:

1. Learn various fundamental concepts about cyber threat intelligence including its importance, types, lifecycle, strategy, capabilities, maturity model, frameworks, etc.

2. Understand various stages of an attack and the deep dive scenario to build appropriate mitigation and defensive mechanisms to protect the organization from known and unknown threats

3. Enable organizations to build a threat intelligence program and identify the right team members to implement the program

4. Learn various concepts of threat intelligence data collection and processing including its importance, types, feeds and sources, data collection management, storing and structuring of data, etc.

5. Comprehend various concepts of data analysis and threat analysis process along with techniques for fine-tuning threat analysis and the like, which helps the analysts to extract better threat intelligence

6. Apply the techniques of evaluating the intelligence and creating knowledge base for storing threat information

7. Learn how to mitigate the risks posed by various cyber threats to improve the security posture of the organizations

Related Occupation(s)
  • Security Analyst
  • Ethical Hacker
  • Digital Forensic Analyst
  • Malware Analyst
Learning Outcomes
  • cybersecurity
  • threat intelligence
  • information security

EC-Council