Threat Intelligence

The target audience for training
- CISO,
- SOC Manager,
- SOC analysts,
- Cybersecurity consultants or anyone in charge of the security of a company's information system.
What you will learn
At the end of the course, trainees will be able to set up an intelligence service on cyber-attack threats using CTI (Cyber Threat Intelligence).
Training programme
- Duration: 3 days
Day 1
Day 1 - Morning
- Objectives and detailed structure of the course.
- Definitions, concepts and scope of CTI (strategic, operational, tactical, technical).
- Typologies of threats and adversaries: APTs, cybercriminals, hacktivists, insiders.
- Presentation of the main regulatory frameworks and models: MITRE ATT&CK, Diamond Model, Kill Chain.
- Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.
Day 1 - Afternoon
- Positioning CTI within the organisation (SOC, CERT, CISO, ISMS).
- Correlation between CTI and the incident management process.
- Demonstration of an attack scenario analysed using the Diamond model.
- Case study: classifying threats in an organisational context.
- Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.
Day 2
Day 2 - Morning
- Collection methods: OSINT, Dark Web, commercial and sector sources.
- Use of internal data (SIEM, EDR, IDS/IPS, system logs).
- Identification and validation of IoCs (indicators of compromise) and IoAs (indicators of attack).
- Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.
Day 2 - Afternoon
- Analysis and correlation of tactics, techniques and procedures (TTP).
- Presentation and use of CTI tools (MISP, YARA, Sigma).
- Practical workshop: collecting and integrating IoC into a CTI platform.
- Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.
Day 3
Day 3 - Morning
- Automation and AI applied to CTI (Machine Learning, SOAR).
- Transformation of raw data into usable information (indicators → information).
- Drafting and distributing CTI reports tailored to specific audiences (CISO, COMEX, SOC).
- Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.
Day 3 - Afternoon
- Key stages in setting up a CTI service within an organisation: governance, processes, tools, skills.
- Success factors and pitfalls to avoid.
- Practical simulation: design of a mini-ITC plan and intelligence sharing exercise.
- Conclusion and summary of the course.
- Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.
- Attendance certificates are handed out and participants evaluate the course.
Trainer profile
Expert Cyber Threat Intelligence consultant and trainer, with dual technical and strategic expertise and extensive field experience in the detection, analysis and management of cyber threats.
Teaching methods and resources:
The course is based on a balanced combination of theoretical and practical approaches, guaranteeing both the acquisition of knowledge and its operational application:
- Structured theoretical input, illustrated by practical examples tailored to the participants' professional context.
- Practical exercises and workshops at every stage to help you acquire the knowledge you need.
- A case study linking the different skill blocks.
- Strong interaction between trainers and trainees, making exchanges more concrete and in correlation with trainees' expectations.
- Full educational documentation, supplied in digital format.
- Course evaluation questionnaire at the end of the course, analysed by our teaching team.
- Certificate of acquired skills sent to the trainee at the end of the course.
- End-of-training certificate sent at the same time as the invoice to the company or funding organisation, confirming that the trainee has fully attended the session.
Training objectives
- Understanding the fundamentals of CTI (Cyber Threat Intelligence)
- Gathering and analysing information on threats
- Use artificial intelligence (AI) to automate the collection, analysis and correlation of threat-related information
- Transforming data into usable information
- Integrate CTI tools and methods into your organisation's security process.
Assessment method
- Practical exercises and workshops at every stage of the course.
- A case study linking the different skill blocks.
- Quiz at the end of each day's training.
- Self-assessment of knowledge acquired by the trainee via a questionnaire.
Training prerequisites
Basic knowledge of how information systems and cyber security work.
- Language : French
- Level : Fundamental
- Certification body : ACG CYBERACADEMY
- Certification: No
- Accessibility : Yes
- Duration: 3 days
Important information:
Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).