Leader in the cybersecurity training sector.

C)TIA: Certified Threat Intelligence Analyst

Target group

  • Penetration Testers 
  • Microsoft Administrator
  • Security Administrators
  • Active Directory Administrators 
  • Anyone looking to learn more about security

Description

Mile2’s CTIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. Mile2’s CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them. The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. Once complete, the student will be competent toward improving a company’s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk. NICE FRAMEWORK WORK-ROLE ID: AN-TWA-001

Program

Module 01: Threat Intelligence Basics

Module 02: Cyber Threats

Module 03: Threat Actors

Module 04: Case Studies

Module 05: Threat Identification

Module 06: Proactive Approach

Detailed lab outline :
  • Lab 01: Practical Threat Analysis
  • Lab 02: Hunting Active Threats
  • Lab 03: Defensive Threat Development
  • Lab 04: Integration with SIEM
  • Lab 05: OSINT Methodology

Goal

Upon completion, Certified Threat Intelligence Analyst course students will have knowledge to perform thorough threat analysis on any information system. Be able to accurately report on their findings, and be ready to sit for the C)TIA exam.

Prerequisites

  • 12 months vulnerability testing 
  • Mile2’s C)VA and C)PEH

Cost

2600 €

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.