CTIA: Certified Threat Intelligence Analyst Training

Category

EC-Council

Rating
4
(4)
Price

$2699

Course Description

CTIA- Certified Threat Intelligence Analyst Training is a well-designed, comprehensive technical course. It is coherently organized, making it easier for the trainees to carry out activities such as developing a systematic, professional, and long-term effective threat intelligence program. To minimize the organization's potential risks, experts in the Cyber intelligence field must possess updated techniques and knowledge. This technical course is developed by EC-Council to help professionals determine and mitigate business risks.

This Certified Threat Intelligence Analyst Training course matches the current trends of the attackers in cyberspace. The training program enables the learning professionals to develop dependable threat intelligence, thus making the trained professional have a competitive edge in the workplace or even the global job market. The course is reviewed from time to time to ensure that the trained professional's benefit from the course by getting equipped with the relevant and up to date skill sets.

Who should attend this course?

This training is designed for Ethical Hackers, Engineers, Architects, Specialist, Security Practitioners and Network security manages. The target audience for this training are Threat Intelligence Researchers, Associates and Consultants.

The secondary audience for this course are Malware Analysts, SOC Professionals and Threat Hunters. The tertiary audience for this training are those professionals who want to advance their skills in cyber threat intelligence or any intermediate level cyber security professionals having experience of 2 years.

What you will learn

  • How to gain in-depth knowledge expertise to implement and structure dependable threat intelligence program.
  • How to understand and differentiate between information security professionals and intelligence professionals.
  • Achieving and mastering skills to develop professional, systematic and long-term efficient threat intelligence program.
  • How to develop predictive capability for active defense mechanism instead of applying only positive measures
  • Learn to plan and execute threat intelligence program which provides actionable advices and evidence-based knowledge about recent or emerging threats.

With Microtek Learning, you’ll receive:

  • Certified Instructor-led training
  • Industry Best Trainers
  • Official Training Course Student Handbook
  • Pre and Post assessments/evaluations
  • Collaboration with classmates (not available for a self-paced course)
  • Real-world knowledge activities and scenarios
  • Exam scheduling support*
  • Learn and earn program*
  • Practice Tests
  • Knowledge acquisition and exam-oriented
  • Interactive online course.
  • Support from an approved expert
  • For Government and Private pricing*
Request Call

Our Clients

For many years, Microtek Learning has been helping organizations, leaders, and professionals to reach their maximum performance by addressing the challenges they are facing.

  • 300+ enterprise clients
  • 100,000+ professionals trained
  • Service 70 of the Fortune 100
  • 96% of our clients would recommend us
our clients

Our Awards

our awards
why choose us

Curriculum

Understanding Intelligence

  • Intelligence Definition and Essential Terminology
  • Intelligence vs. Information vs. Data
  • Intelligence-Led Security Testing (Background and Reasons)
  • Understanding Cyber Threat Intelligence

  • Cyber Threat Intelligence (CTI)
  • Cyber Threat Intelligence Stages
  • Characteristics of Threat Intelligence
  • Benefits of CTI
  • Enterprise Objectives for Threat Intelligence Programs
  • How can Threat Intelligence Help Organizations
  • Types of Threat Intelligence
  • Threat Intelligence Generation
  • Threat Intelligence Informed Risk Management
  • Integration of Threat Intelligence into SIEM
  • Leverage Threat Intelligence for Enhanced Incident Response
  • Organizational Scenarios using Threat Intelligen
  • What Organizations and Analysts Expect?
  • Common Information Security Organization (CISO) Structure
  • Threat Intelligence Use Cases
  • Overview of Threat Intelligence Lifecycle and Frameworks

  • Threat Intelligence Lifecycle
  • Threat Analyst Roles in Threat Intelligence Lifecycle
  • Threat Intelligence Strategy
  • Threat Intelligence Capabilities
  • Capabilities to Look for in Threat Intelligence Solution
  • Threat Intelligence Maturity Model
  • Threat Intelligence Frameworks
  • Additional Threat Intelligence Frameworks
  • Understanding Cyber Threats

  • Overview of Cyber Threats
  • Cyber Security Threat Categories
  • Threat Actors/Profiling the Attacker
  • Threat: Intent, Capability, Opportunity Triad
  • Motives, Goals, and Objectives of Cyber Security Attacks
  • Hacking Forums
  • Understanding Advanced Persistent Threats (APTs)

  • Advanced Persistent Threats (APTs)
  • Characteristics of Advanced Persistent Threats (APTs)
  • Advanced Persistent Threat Lifecycle
  • Understanding Cyber Kill Chain

  • Cyber Kill Chain Methodology
  • Tactics, Techniques, and Procedures (TTPs)
  • Adversary Behavioral Identification
  • Kill Chain Deep Dive Scenario - Spear Phishing
  • Understanding Indicators of Compromise (IoCs)

  • Indicators of Compromise (IoCs)
  • Why Indicators of Compromise Important?
  • Categories of IoCs
  • Key Indicators of Compromise
  • Pyramid of Pain
  • Understanding Organization’s Current Threat Landscape

  • Identify Critical Threats to the Organization
  • Assess Organization’s Current Security Pressure Posture
  • Assess Risks for Identified Threats
  • Understanding Requirements Analysis

  • Map out Organization’s Ideal Target State
  • Identify Intelligence Needs and Requirements
  • Define Threat Intelligence Requirements
  • Business Needs and Requirements
  • Intelligence Consumers Needs and Requirements
  • Priority Intelligence Requirements (PIRs)
  • Factors for Prioritizing Requirements
  • MoSCoW Method for Prioritizing Requirements
  • Prioritize Organizational Assets
  • Scope Threat Intelligence Program
  • Rules of Engagement
  • Non-Disclosure Agreements
  • Avoid Common Threat Intelligence Pitfalls
  • Planning Threat Intelligence Program

  • Prepare People, Processes, and Technology
  • Develop a Collection Plan
  • Schedule Threat Intelligence Program
  • Plan a Budget
  • Develop Communication Plan to Update Progress to Stakeholders
  • Aggregate Threat Intelligence
  • Select a Threat Intelligence Platform
  • Consuming Intelligence for Different Goals
  • Track Metrics to Keep Stakeholders Informed
  • Establishing Management Support

  • Prepare Project Charter and Policy to Formalize the Initiative
  • Building a Threat Intelligence Team

  • Satisfy Organizational Gaps with the Appropriate Threat Intelligence Team
  • Overview of Threat Intelligence Sharing

  • Establishing Threat Intelligence Sharing Capabilities
  • Considerations for Sharing Threat Intelligence
  • Sharing Intelligence with Variety of Organizations
  • Types of Sharing Partners
  • Important Selection Criteria for Partners
  • Sharing Intelligence Securely
  • Reviewing Threat Intelligence Program

  • Threat Intelligence Led Engagement Review
  • Considerations for Reviewing Threat Intelligence Program
  • Assessing the Success and Failure of the Threat Intelligence Program
  • Overview of Threat Intelligence Data Collection

  • Introduction to Threat Intelligence Data Collection
  • Data Collection Methods
  • Types of Data
  • Types of Threat Intelligence Data Collection
  • Overview of Threat Intelligence Collection Management

  • Understanding Operational Security for Data Collection
  • Understanding Data Reliability
  • Ensuring Intelligence Collection Methods Produce Actionable Data
  • Validate the Quality and Reliability of Third Party Intelligence Sources
  • Establish Collection Criteria for Prioritization of Intelligence Needs and Requirements
  • Building a Threat Intelligence Collection Plan
  • Overview of Threat Intelligence Feeds and Sources

  • Threat Intelligence Feeds
  • Threat Intelligence Sources
  • Understanding Threat Intelligence Data Collection and Acquisition

  • Threat Intelligence Data Collection and Acquisition
  • Data Collection through Open Source Intelligence (OSINT)
  • Data Collection through Human Intelligence (HUMINT)
  • Data Collection through Cyber Counterintelligence (CCI)
  • Data Collection through Indicators of Compromise (IoCs)
  • Data Collection through Malware Analysis
  • Understanding Bulk Data Collection

  • Introduction to Bulk Data Collection
  • Forms of Bulk Data Collection
  • Benefits and Challenges of Bulk Data Collection
  • Bulk Data Management and Integration Tools
  • Understanding Data Processing and Exploitation

  • Threat Intelligence Data Collection and Acquisition
  • Introduction to Data Processing and Exploitation
  • Structuring/Normalization of Collected Data
  • Data Sampling
  • Storing and Data Visualization
  • Sharing the Threat Information
  • Overview of Data Analysis

  • Introduction to Data Analysis
  • Contextualization of Data
  • Types of Data Analysis
  • Understanding Data Analysis Techniques

  • Statistical Data Analysis
  • Analysis of Competing Hypotheses (ACH)
  • ACH Tool
  • Structured Analysis of Competing Hypotheses (SACH)
  • Other Data Analysis Methodologies
  • Overview of Threat Analysis

  • Introduction to Threat Analysis
  • Types of Threat Intelligence Analysis
  • Understanding Threat Analysis Process

  • Threat Analysis Process and Responsibilities
  • Threat Analysis based on Cyber Kill Chain Methodology
  • Aligning the Defensive Strategies with the Phases of the Cyber Kill Chain Methodology
  • Perform Threat Modeling
  • Threat Modeling Methodologies
  • Threat Modeling Tools
  • Enhance Threat Analysis Process with the Diamond Model Framework
  • Enrich the Indicators with Context
  • Validating and Prioritizing Threat Indicators
  • Overview of Fine-Tuning Threat Analysis

  • Fine-Tuning Threat Analysis
  • Identifying and Removing Noise
  • Identifying and Removing Logical Fallacies
  • Identifying and Removing Cognitive Biases
  • Automate Threat Analysis Processes
  • Develop Criteria for Threat Analysis Software
  • Employ Advanced Threat Analysis Techniques
  • Understanding Threat Intelligence Evaluation

  • Threat Intelligence Evaluation
  • Threat Attribution
  • Creating Runbooks and Knowledge Base

  • Developing Runbooks
  • Create an Accessible Threat Knowledge Repository
  • Organize and Store Cyber Threat Information in Knowledge Base
  • Overview of Threat Intelligence Tools

  • Threat Intelligence Tools
  • Overview of Threat Intelligence Reports

  • Threat Intelligence Reports
  • Types of Cyber Threat Intelligence Reports
  • Generating Concise Reports
  • Threat Intelligence Report Template
  • How to Maximize the Return from Threat Intelligence Report
  • Continuous Improvement via Feedback Loop
  • Report Writing Tools
  • Introduction to Dissemination

  • Overview of Dissemination
  • Preferences for Dissemination
  • Benefits of Sharing Intelligence
  • Challenges to Intelligence Sharing
  • Disseminate Threat Intelligence Internally
  • Building Blocks for Threat Intelligence Sharing
  • Begin Intelligence Collaboration
  • Establish Information Sharing Rules
  • Information Sharing Model
  • Information Exchange Types
  • TI Exchange Architectures
  • TI Sharing Quality
  • Access Control on Intelligence Sharing
  • Intelligence Sharing Best Practices
  • Participating in Sharing Relationships

  • Why Sharing Communities are Formed?
  • Join a Sharing Community
  • Factors to be Considered When Joining a Community
  • Engage in Ongoing Communication
  • Consume and Respond to Security Alerts
  • Consume and Use Indicators
  • Produce and Publish Indicators
  • External Intelligence Sharing
  • Establishing Trust
  • Organizational Trust Models
  • Overview of Sharing Threat Intelligence

  • Sharing Strategic Threat Intelligence
  • Sharing Tactical Threat Intelligence
  • Sharing Operational Threat Intelligence
  • Sharing Technical Threat Intelligence
  • Sharing Intelligence using YARA Rules
  • IT-ISAC (Information Technology - Information Security and Analysis Center)
  • Overview of Delivery Mechanisms

  • Forms of Delivery
  • Machine Readable Threat Intelligence (MRTI)
  • Standards and Formats for Sharing Threat Intelligence
  • Understanding Threat Intelligence Sharing Platforms

  • Information Sharing and Collaboration Platforms
  • Overview of Intelligence Sharing Acts and Regulations

  • Cyber Intelligence Sharing and Protection Act (CISPA)
  • Cybersecurity Information Sharing Act (CISA)
  • Overview of Threat Intelligence Integration

  • Integrating Threat Intelligence
  • How to Integrate CTI into the Environment
  • Acting on the Gathered Intelligence
  • Tactical Intelligence Supports IT Operations: Blocking, Patching, and Triage
  • Operational Intelligence Supports Incident Response: Fast Reaction and Remediation
  • Strategic Intelligence Supports Management: Strategic Investment and Communications
  • FAQs

    Microtek Learning, as being the top performing EC-council's accredited training center provides 3 days virtual Certified Threat Intelligence Analyst certification training.

    CTIA certification training exam format is multiple choice type. The Certified Threat Intelligence Analyst certification exam period is two hours during which you have to attempt 50 questions.

    You need to score at least 70% to get CTIA certification.

    The courseware price provided by EC-council is $250; just purchasing the courseware doesn't make you eligible to appear in CTIA exam.

    In addition to a valid CTIA certification, you need to posses the strong computer skills, language skills, excellent analytical abilities, forward thinking, reporting skills and teamwork skill etc.

    The jobs of Threat Intelligence Analyst are projected to increase @ 28 percent up to 2026.

    REVIEWS ON OUR POPULAR COURSES

    male

    I was sceptical at first whether to enrol with Microtek Learning or not, however, I am glad that I did- I got everything that was promised (maybe more). The trainer was very patient and knowledgeable and with his effort and mine, I was able to clear the exam with ease! Keep up the good work everyone.

    MARTIN

    TORONTO, CANADA

    • (5)
    male

    I'm really impressed with the storytelling skills of the instructor. She makes the session exciting by keeping things simple and easy to understand.

    Prince N.

    Texas

    • (5)
    male

    I was recommended the ITIL 4 Foundation course by an IT professional who had completed the same course at Microtek Learning. The training gave me a thorough understanding of service management that I felt I could take back to my job as an IT Project Management and apply it to improve the value of products and services.

    Marsh George

    Texas

    • (5)
    Accredited By

    Course Details

    • Duration: 3 Days
    • Certification: Yes
    • Enrolled: 1479
    • Price: $2699
    side post

    Talk to Learning Advisor

    Get In Touch

    * I authorize Microtek Learning to contact me via Phone/Email