{"id":11367,"date":"2024-07-09T16:15:19","date_gmt":"2024-07-09T14:15:19","guid":{"rendered":"https:\/\/cyberacademy.altaydagistan.com\/?post_type=mec-events&#038;p=11367"},"modified":"2025-11-19T11:22:23","modified_gmt":"2025-11-19T10:22:23","slug":"ctia-certified-threat-intelligence-analyst","status":"publish","type":"mec-events","link":"http:\/\/acgcyberacademy.fr\/en\/events\/ctia-certified-threat-intelligence-analyst\/","title":{"rendered":"C)TIA: Certified Threat Intelligence Analyst"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"11367\" class=\"elementor elementor-11367\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4fad91 elementor-widget elementor-widget-image\" data-id=\"1b4fad91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/mile2.com\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"359\" height=\"169\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Mile2-logo.jpg\" class=\"attachment-large size-large wp-image-11194\" alt=\"MILE2 ACG CyberAcademy Formation\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Mile2-logo.jpg 359w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Mile2-logo-300x141.jpg 300w\" sizes=\"(max-width: 359px) 100vw, 359px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ad7b056 elementor-widget elementor-widget-heading\" data-id=\"4ad7b056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Target group<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Penetration Testers\u00a0<\/li><li>Microsoft Administrator<\/li><li>Security Administrators<\/li><li>Active Directory Administrators\u00a0<\/li><li>Anyone looking to learn more about security<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d6e3ac1 e-flex e-con-boxed e-con e-child\" data-id=\"5d6e3ac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Description <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Mile2's CTIA<\/strong> course will help security professionals learn how to make good use of the many sources of threat intelligence. It will help an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. Mile2's CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them. The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. Once complete, the student will be competent toward improving a company's existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk. NICE FRAMEWORK WORK-ROLE ID: AN-TWA-001<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71419de5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"71419de5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ca12bed elementor-widget elementor-widget-heading\" data-id=\"1ca12bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Program<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10905e70 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"10905e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Duration : 4 days<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-246a6af elementor-widget elementor-widget-text-editor\" data-id=\"246a6af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Module 01: <\/b>Threat Intelligence Basics<\/p><p><b>Module 02:<\/b> Cyber Threats<\/p><p><strong>Module 03:<\/strong> Threat Actors<\/p><p><strong>Module 04:<\/strong> Case Studies<\/p><p><strong>Module 05:<\/strong> Threat Identification<\/p><p><strong>Module 06:<\/strong> Proactive Approach<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7c9ff5 elementor-widget elementor-widget-n-accordion\" data-id=\"e7c9ff5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2430\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-2430\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Detailed lab outline :  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2430\" class=\"elementor-element elementor-element-c3682a7 e-con-full e-flex e-con e-child\" data-id=\"c3682a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2430\" class=\"elementor-element elementor-element-935023a e-flex e-con-boxed e-con e-child\" data-id=\"935023a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-976847a elementor-widget elementor-widget-text-editor\" data-id=\"976847a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Lab 01: Practical Threat Analysis<\/li><li>Lab 02: Hunting Active Threats<\/li><li>Lab 03: Defensive Threat Development<\/li><li>Lab 04: Integration with SIEM<\/li><li>Lab 05: OSINT Methodology<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Goal<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Upon completion, Certified Threat Intelligence Analyst course students will have knowledge to perform thorough threat analysis on any information system. Be able to accurately report on their findings, and be ready to sit for the C)TIA exam.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Prerequisites<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfa19f0 elementor-widget elementor-widget-text-editor\" data-id=\"2cfa19f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>12 months vulnerability testing\u00a0<\/li><li>Mile2's C)VA and C)PEH<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b52a59 e-flex e-con-boxed e-con e-parent\" data-id=\"5b52a59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-158a494 elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"158a494\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/CTIA-Web-Outline.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">See the brochure for this course<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-108ca03 e-flex e-con-boxed e-con e-parent\" data-id=\"108ca03\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Target group Penetration Testers\u00a0 Microsoft Administrator Security Administrators Active Directory Administrators\u00a0 Anyone looking to learn more about security Description Mile2\u2019s CTIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":11358,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[159],"examen":[146],"langue":[164],"niveau":[112],"formateur":[103],"mec_category":[121],"class_list":["post-11367","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","duree-4-jours","examen-oui","langue-anglais","niveau-level-350","formateur-mile2","mec_category-prevention-cyber-threat-analyst"],"acf":{"taux_davis_etoile":4.6,"taux_de_reussite":4.7,"formation_populaire":false,"lien_guide_dexamen":"","liste_importance_formations":9},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>C)TIA: Certified Threat Intelligence Analyst - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"C)TIA: Certified Threat Intelligence Analyst \u2013 Learn to analyze, interpret, and respond to threats, improving your organization&#039;s security posture\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/ctia-certified-threat-intelligence-analyst\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C)TIA: Certified Threat Intelligence Analyst - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"C)TIA: Certified Threat Intelligence Analyst \u2013 Learn to analyze, interpret, and respond to threats, improving your organization&#039;s security posture\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/ctia-certified-threat-intelligence-analyst\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-19T10:22:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/ctia-BADGEArtboard-5-8-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"301\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ctia-certified-threat-intelligence-analyst\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ctia-certified-threat-intelligence-analyst\\\/\",\"name\":\"C)TIA: Certified Threat Intelligence Analyst - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ctia-certified-threat-intelligence-analyst\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ctia-certified-threat-intelligence-analyst\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/ctia-BADGEArtboard-5-8-1.webp\",\"datePublished\":\"2024-07-09T14:15:19+00:00\",\"dateModified\":\"2025-11-19T10:22:23+00:00\",\"description\":\"C)TIA: Certified Threat Intelligence Analyst \u2013 Learn to analyze, interpret, and respond to threats, improving your organization's security posture\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ctia-certified-threat-intelligence-analyst\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ctia-certified-threat-intelligence-analyst\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ctia-certified-threat-intelligence-analyst\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/ctia-BADGEArtboard-5-8-1.webp\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/ctia-BADGEArtboard-5-8-1.webp\",\"width\":301,\"height\":300,\"caption\":\"C)TIA: Certified Threat Intelligence Analyst \u2013 Learn to analyze, interpret, and respond to threats, improving your organization's security posture\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ctia-certified-threat-intelligence-analyst\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"C)TIA: Certified Threat Intelligence Analyst\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C)TIA: Certified Threat Intelligence Analyst - ACG CyberAcademy","description":"C)TIA: Certified Threat Intelligence Analyst \u2013 Learn to analyze, interpret, and respond to threats, improving your organization's security posture","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/ctia-certified-threat-intelligence-analyst\/","og_locale":"en_GB","og_type":"article","og_title":"C)TIA: Certified Threat Intelligence Analyst - ACG CyberAcademy","og_description":"C)TIA: Certified Threat Intelligence Analyst \u2013 Learn to analyze, interpret, and respond to threats, improving your organization's security posture","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/ctia-certified-threat-intelligence-analyst\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2025-11-19T10:22:23+00:00","og_image":[{"width":301,"height":300,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/ctia-BADGEArtboard-5-8-1.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/ctia-certified-threat-intelligence-analyst\/","url":"https:\/\/acgcyberacademy.fr\/events\/ctia-certified-threat-intelligence-analyst\/","name":"C)TIA: Certified Threat Intelligence Analyst - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ctia-certified-threat-intelligence-analyst\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ctia-certified-threat-intelligence-analyst\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/ctia-BADGEArtboard-5-8-1.webp","datePublished":"2024-07-09T14:15:19+00:00","dateModified":"2025-11-19T10:22:23+00:00","description":"C)TIA: Certified Threat Intelligence Analyst \u2013 Learn to analyze, interpret, and respond to threats, improving your organization's security posture","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ctia-certified-threat-intelligence-analyst\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/ctia-certified-threat-intelligence-analyst\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/ctia-certified-threat-intelligence-analyst\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/ctia-BADGEArtboard-5-8-1.webp","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/ctia-BADGEArtboard-5-8-1.webp","width":301,"height":300,"caption":"C)TIA: Certified Threat Intelligence Analyst \u2013 Learn to analyze, interpret, and respond to threats, improving your organization's security posture"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/ctia-certified-threat-intelligence-analyst\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"C)TIA: Certified Threat Intelligence Analyst"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/11367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=11367"}],"version-history":[{"count":8,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/11367\/revisions"}],"predecessor-version":[{"id":21795,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/11367\/revisions\/21795"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/11358"}],"wp:attachment":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=11367"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=11367"},{"taxonomy":"accesibilite","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=11367"},{"taxonomy":"certification","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=11367"},{"taxonomy":"duree","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=11367"},{"taxonomy":"examen","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=11367"},{"taxonomy":"langue","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=11367"},{"taxonomy":"niveau","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=11367"},{"taxonomy":"formateur","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=11367"},{"taxonomy":"mec_category","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=11367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}