(CTIA) Certified Threat Intelligence Analyst

Gain expertise in threat intelligence with EC-Council’s CTIA certification, focusing on actionable insights to prevent and monitor cyber-attacks.

Category:

Once you have completed this course, you’ll be able to learn:

  • Fundamentals of threat intelligence (Threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, platforms, etc.)
  • Various cybersecurity threats and attack frameworks (Advanced Persistent Threats Cyber Kill Chain Methodology, MITRE ATTACK Framework, Diamond Model of Intrusion Analysis, etc.)
  • Various steps involved in planning a threat intelligence program (Requirements, planning, direction, and review)
  • Different types of threat intelligence feeds, sources, data collection methods
  • Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (loCs), Malware Analysis, and Python Scripting
  • Threat intelligence data processing and exploitation
  • Threat data analysis techniques (Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)
  • Complete threat analysis process, which includes threat modeling, fine-tuning, evaluation, and runbook and knowledge base creation
  • How to create and share threat intelligence reports
  • Threat intelligence sharing and collaboration using Python scripting
  • Different platforms, acts, and regulations for sharing intelligence
  • How to perform threat intelligence in a cloud environment
  • Fundamentals of threat hunting (Threat hunting types, process, loop, methodology, etc.)
  • Threat-hunting automation using Python scripting.
  • Threat intelligence in SOC operations, incident response, and risk management

 

As per the EC-Council’s C|TIA program, candidates must have an educational background and at least 2 years of working experience in cyber security, IT, or related fields.

  • Security Analyst
  • Incident Investigators
  • Security Operations Manager
  • Security Architect
  • Security Manager
  • 1.1 – Intelligence
  • 1.2 – Cyber Threat Intelligence Concepts
  • 1.3 – Threat Intelligence Lifecycle and Frameworks
  • 1.4 – Threat Intelligence Platforms (TIPs)
  • 1.5 – Threat Intelligence in the Cloud Environment
  • 1.6 – Future Trends and Continuous Learning
  • 2.1 – Cyber Threats
  • 2.2 – Advanced Persistent Threats
  • 2.3 – Cyber Kill Chain
  • 2.4 – MITRE ATT&CK and Diamond Model
  • 2.5 – Indicators of Compromise
  • 3.1 – Organization’s Current Threat Landscape
  • 3.2 – Requirements Analysis
  • 3.3 – Plan a Threat Intelligence Program
  • 3.4 – Establish Management Support
  • 3.5 – Build a Threat Intelligence Team
  • 3.6 – Threat Intelligence Sharing
  • 3.7 – Review Threat Intelligence Program
  • 4.1 – Threat Intelligence Data Collection
  • 4.2 – Threat Intelligence Collection Management
  • 4.3 – Threat Intelligence Feeds and Sources
  • 4.4 – Threat Intelligence Data Collection and Acquisition
  • 4.5 – Bulk Data Collection
  • 4.6 – Data Processing and Exploitation
  • 4.7 – Threat Data Collection and Enrichment in Cloud Environments
  • 5.1 – Data Analysis
  • 5.2 – Data Analysis Techniques
  • 5.3 – Threat Analysis
  • 5.4 – Threat Analysis Process
  • 5.5 – Fine-Tuning Threat Analysis
  • 5.6 – Threat Intelligence Evaluation
  • 5.7 – Create Runbooks and Knowledge Base
  • 5.8 – Threat Intelligence Tools
  • 6.1 – Threat Intelligence Reports
  • 6.2 – Dissemination
  • 6.3 – Participate in Sharing Relationships
  • 6.4 – Sharing Threat Intelligence
  • 6.5 – Delivery Mechanisms
  • 6.6 – Threat Intelligence Sharing Platforms
  • 6.7 – Intelligence Sharing Acts and Regulations
  • 6.8 – Threat Intelligence Integration
  • 6.9 – Threat Intelligence Sharing and Collaboration using Python Scripting
  • 7.1 – Threat Hunting Concepts
  • 7.2 – Threat Hunting Automation
  • 8.1 – Threat Intelligence in SOC Operations
  • 8.2 – Threat Intelligence in Risk Management
  • 8.3 – Threat Intelligence in Incident Response
Length of exam 2 hours
Number of questions 50
Question format Multiple Choice
Passing grade 70%
Exam availability English
Testing center ECC Exam Portal

Description

EC-Council’s Certified Threat Intelligence Analyst (CTIA) certification is a comprehensive specialist- level professional program focused on the ever- evolving domain of threat intelligence. The program is designed for individuals involved in collecting, analyzing, and disseminating threat intelligence information.

CTIA covers a wide range of topics, including the fundamentals of threat intelligence, the use of threat intelligence tools and techniques, and the development of a threat intelligence program. The cyber threat intelligence course focuses on refining data and information into actionable intelligence that can be used to prevent, detect, and monitor cyber- attacks. The program addresses all the stages involved in the threat intelligence lifecycle, and this attention toward a realistic and futuristic approach makes CTIA one of the most comprehensive threat intelligence certifications in the market today.

The program was based on a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. This program differentiates threat intelligence professionals from other information security professionals. It is a highly interactive, comprehensive, standards-based, intensive 3-day training program that teaches information security professionals to build professional threat intelligence.