{"id":16076,"date":"2025-02-14T16:42:21","date_gmt":"2025-02-14T15:42:21","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?post_type=mec-events&#038;p=16076"},"modified":"2025-11-19T15:47:09","modified_gmt":"2025-11-19T14:47:09","slug":"ec-council-certified-threat-intelligence-analyst-ctia","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/","title":{"rendered":"EC-Council Certified Threat Intelligence Analyst (C|TIA)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"16076\" class=\"elementor elementor-16076\" wpc-filter-elementor-widget=\"1\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4fad91 elementor-widget elementor-widget-image\" data-id=\"1b4fad91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"793\" height=\"181\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview.png\" class=\"attachment-large size-large wp-image-12501\" alt=\"EC-Council Certified Acg CyberAcademy\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview.png 793w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview-300x68.png 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview-768x175.png 768w\" sizes=\"(max-width: 793px) 100vw, 793px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25867c6 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"25867c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15b1961 elementor-widget elementor-widget-image\" data-id=\"15b1961\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"525\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIA-logo.png\" class=\"attachment-large size-large wp-image-16079\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIA-logo.png 951w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIA-logo-300x197.png 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIA-logo-768x504.png 768w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIA-logo-18x12.png 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Description <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>EC-Council&rsquo;s Certified Threat Intelligence Analyst (C|TIA)<\/b> Certification is a comprehensive specialist-level professional program focused on the ever-evolving domain of threat intelligence. The program is designed for individuals involved in collecting, analyzing, and disseminating threat intelligence information.<\/p><p><br \/><b>C|TIA<\/b> covers various topics, including the fundamentals of threat intelligence, the use of threat intelligence tools and techniques, and the development of a threat intelligence program. This course focuses on refining data and information into actionable intelligence that can be used to prevent, detect, and monitor cyber-attacks. It addresses all stages involved in the threat intelligence lifecycle, and this attention toward a realistic and futuristic approach makes it one of the most comprehensive threat intelligence certifications in the market today.<\/p><p><br \/>The program provides credible professional insights required for a successful threat intelligence career and enhances your overall skills, thus increasing your employability. It is desired by most cybersecurity engineers, analysts, and professionals globally and is respected by hiring authorities. Ideal for individuals working in information security, network security, incident response, and other related fields. Mastering skills and earning this certification can help enhance threat intelligence operations and investments for cybersecurity individuals and teams.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdbcfe6 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"fdbcfe6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Target group<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"course-section__content\"><div class=\"course-section__rtf\"><div class=\"course-section course-section--hidden\" tabindex=\"0\" data-section=\"3\"><div class=\"course-section__content\"><div class=\"course-section__rtf\"><div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\"><div class=\"su-list\"><ul><li>Mid-level to high-level cybersecurity professionals with a minimum of three years of experience.<\/li><li>Individuals with EC-Council&rsquo;s C|EH and C|ND certifications can enroll in this<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9471f9 elementor-widget elementor-widget-spacer\" data-id=\"f9471f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93acd74 elementor-widget elementor-widget-heading\" data-id=\"93acd74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training Program\n\n\n\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a02142 elementor-widget elementor-widget-n-accordion\" data-id=\"4a02142\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7760\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-7760\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 01 : Introduction to Threat Intelligence <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7760\" class=\"elementor-element elementor-element-500770f e-con-full e-flex e-con e-child\" data-id=\"500770f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7760\" class=\"elementor-element elementor-element-a59b0f3 e-flex e-con-boxed e-con e-child\" data-id=\"a59b0f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f06477d elementor-widget elementor-widget-text-editor\" data-id=\"f06477d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Understand Intelligence<\/li><li>Summarize Cyber Threat Intelligence Concepts<\/li><li>Explain Threat Intelligence Lifecycle and Frameworks<\/li><li>Understand Threat Intelligence Platforms (TIPs)<\/li><li>Understand Threat Intelligence in the Cloud Environment<\/li><li>Understand Future Trends and Continuous Learning<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7761\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7761\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 02 : Cyber Threats and Attack Frameworks <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7761\" class=\"elementor-element elementor-element-1ecce40 e-con-full e-flex e-con e-child\" data-id=\"1ecce40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7761\" class=\"elementor-element elementor-element-5f532f2 e-flex e-con-boxed e-con e-child\" data-id=\"5f532f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2618967 elementor-widget elementor-widget-text-editor\" data-id=\"2618967\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Understand Cyber Threats<\/li><li>Explain Advanced Persistent Threats<\/li><li>Explain Cyber Kill Chain<\/li><li>Explain MITRE ATT&amp;CK and Diamond Model<\/li><li>Understand Indicators of Compromise<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7762\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7762\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 03 : Requirements, Planning, Direction, and Review <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7762\" class=\"elementor-element elementor-element-53bc483 e-con-full e-flex e-con e-child\" data-id=\"53bc483\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7762\" class=\"elementor-element elementor-element-ee028da e-flex e-con-boxed e-con e-child\" data-id=\"ee028da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6115c32 elementor-widget elementor-widget-text-editor\" data-id=\"6115c32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Understand the Organization\u2019s Current Threat Landscape<\/li><li>Understand Requirements Analysis<\/li><li>Plan a Threat Intelligence Program<\/li><li>Establish Management Support<\/li><li>Build a Threat Intelligence Team<\/li><li>Understand Threat Intelligence Sharing<\/li><li>Review Threat Intelligence Program<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7763\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7763\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 04 : Data Collection and Processing <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7763\" class=\"elementor-element elementor-element-52eb721 e-flex e-con-boxed e-con e-child\" data-id=\"52eb721\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7763\" class=\"elementor-element elementor-element-bda39b2 e-con-full e-flex e-con e-child\" data-id=\"bda39b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9a6be1 elementor-widget elementor-widget-text-editor\" data-id=\"d9a6be1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Understand Threat Intelligence Data Collection<\/li><li>Summarize Threat Intelligence Collection Management<\/li><li>Explain Threat Intelligence Feeds and Sources<\/li><li>Explain Threat Intelligence Data Collection and Acquisition<\/li><li>Understand Bulk Data Collection<\/li><li>Explain Data Processing and Exploitation<\/li><li>Understand Threat Data Collection and Enrichment in Cloud Environments<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7764\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7764\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 05 : Data Analysis <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7764\" class=\"elementor-element elementor-element-54f3466 e-flex e-con-boxed e-con e-child\" data-id=\"54f3466\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7764\" class=\"elementor-element elementor-element-8baf28f e-con-full e-flex e-con e-child\" data-id=\"8baf28f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-020a9f4 elementor-widget elementor-widget-text-editor\" data-id=\"020a9f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Summarize Data Analysis<\/li><li>Explain Data Analysis Techniques<\/li><li>Understand Threat Analysis<\/li><li>Demonstrate Threat Analysis Process<\/li><li>Explain Fine-tuning Threat Analysis<\/li><li>Understand Threat Intelligence Evaluation<\/li><li>Create Runbooks and Knowledge Base<\/li><li>Use Threat Intelligence Tools<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7765\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7765\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 06 : Intelligence Reporting and Dissemination <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7765\" class=\"elementor-element elementor-element-220c26d e-flex e-con-boxed e-con e-child\" data-id=\"220c26d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7765\" class=\"elementor-element elementor-element-4f85063 e-con-full e-flex e-con e-child\" data-id=\"4f85063\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-274ffa7 elementor-widget elementor-widget-text-editor\" data-id=\"274ffa7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Understand Threat Intelligence Reports<\/li><li>Understand Dissemination<\/li><li>Participate in Sharing Relationships<\/li><li>Understand Sharing Threat Intelligence<\/li><li>Explain Delivery Mechanisms<\/li><li>Use Threat Intelligence Sharing Platforms<\/li><li>Understand Intelligence Sharing Acts and Regulations<\/li><li>Explain Threat Intelligence Integration<\/li><li>Understand Intelligence Sharing and Collaboration using Python Scripting<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7766\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7766\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 07 : Threat Hunting and Detection <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7766\" class=\"elementor-element elementor-element-1dba6c2 e-flex e-con-boxed e-con e-child\" data-id=\"1dba6c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7766\" class=\"elementor-element elementor-element-ba19dfb e-con-full e-flex e-con e-child\" data-id=\"ba19dfb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84148c7 elementor-widget elementor-widget-text-editor\" data-id=\"84148c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Summarize Threat Hunting Concepts<\/li><li>Understand Threat Hunting Automation<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7767\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7767\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 08 : Threat Intelligence in SOC Operations, Incident Response, and Risk Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7767\" class=\"elementor-element elementor-element-8345d4c e-flex e-con-boxed e-con e-child\" data-id=\"8345d4c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7767\" class=\"elementor-element elementor-element-8445068 e-con-full e-flex e-con e-child\" data-id=\"8445068\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-621bf60 elementor-widget elementor-widget-text-editor\" data-id=\"621bf60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Understand Threat Intelligence in SOC Operations<\/li><li>Understand Threat Intelligence in Risk Management<\/li><li>Understand Threat Intelligence in Incident Response<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Goal<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element\"><div class=\"wpb_wrapper\"><div class=\"su-list\"><ul><li>Gain skills for performing various types of threat intelligence\u00a0<\/li><li>Learn various data collection techniques from multiple sources and feeds<\/li><li>Emphasis on collection, creation, and dissemination of\u00a0Indicators of Compromise (IoCs) in various formats<\/li><li>Gain proficiency in developing a structured approach for performing threat analysis and threat intelligence evaluation.<\/li><li>Learn various techniques for threat intelligence reporting and dissemination<\/li><li>Know the latest threat intelligence tools\/platforms and frameworks<\/li><li>Know how to perform threat intelligence through Python Scripting<\/li><li>Gain skills in threat hunting and detection<\/li><li>Learn threat intelligence in SOC Operations, Incident Response, and Risk Management<\/li><li>Enhance your threat intelligence skills in the cloud environment<\/li><li>Based on a comprehensive industry-wide Job Task Analysis (JTA)<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Recommended<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfa19f0 elementor-widget elementor-widget-text-editor\" data-id=\"2cfa19f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words text-start [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"27870c5c-bcd1-46a6-88c7-04a7e41e22aa\" data-message-model-slug=\"gpt-4o\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert light\"><p data-start=\"0\" data-end=\"215\" data-is-last-node=\"\">There are no formal prerequisites to attend the CTIA v2 training. However, to be eligible for the certification exam, candidates must have at least three years of professional experience in cybersecurity or software development.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0febfa4 elementor-widget elementor-widget-heading\" data-id=\"0febfa4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training Program\n\n\n\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0be4f2f e-flex e-con-boxed e-con e-parent\" data-id=\"0be4f2f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-01bf140 e-con-full e-flex e-con e-child\" data-id=\"01bf140\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-20945c5 e-con-full e-flex e-con e-child\" data-id=\"20945c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b6f4a1 elementor-button-info elementor-align-left elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"2b6f4a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIAv2-Brochure.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View the brochure for this training<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c36580 e-con-full e-flex e-con e-child\" data-id=\"0c36580\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b2bbef elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5b2bbef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIAv2-Course-Outline-1.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Explore the Course Outline<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-99ba159 e-con-full e-flex e-con e-child\" data-id=\"99ba159\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25cf2dc elementor-button-info elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"25cf2dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIAv2-Lab-Setup-Guide.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Access the Lab Setup Guide<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Description EC-Council&rsquo;s Certified Threat Intelligence Analyst (C|TIA) Certification is a comprehensive specialist-level professional program focused on the ever-evolving domain of threat intelligence. The program is designed for individuals involved in collecting, analyzing, and disseminating threat intelligence information. C|TIA covers various topics, including the fundamentals of threat intelligence, the use of threat intelligence tools and techniques, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":16119,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[],"examen":[146],"langue":[164],"niveau":[85],"formateur":[176],"cpf":[],"organismes":[],"organisme":[],"mec_category":[78],"class_list":["post-16076","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","examen-oui","langue-anglais","niveau-avance","formateur-ec-council","mec_category-cybersecurite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EC-Council Certified Threat Intelligence Analyst (C|TIA) - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Learn to collect, analyze, and transform data into actionable intelligence to strengthen cyber defense with EC-Council Certified Threat Intelligence Analyst (C|TIA)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EC-Council Certified Threat Intelligence Analyst (C|TIA) - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Learn to collect, analyze, and transform data into actionable intelligence to strengthen cyber defense with EC-Council Certified Threat Intelligence Analyst (C|TIA)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-19T14:47:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIA-V2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-certified-threat-intelligence-analyst-ctia\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-certified-threat-intelligence-analyst-ctia\\\/\",\"name\":\"EC-Council Certified Threat Intelligence Analyst (C|TIA) - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-certified-threat-intelligence-analyst-ctia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-certified-threat-intelligence-analyst-ctia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/CTIA-V2-1.jpg\",\"datePublished\":\"2025-02-14T15:42:21+00:00\",\"dateModified\":\"2025-11-19T14:47:09+00:00\",\"description\":\"Learn to collect, analyze, and transform data into actionable intelligence to strengthen cyber defense with EC-Council Certified Threat Intelligence Analyst (C|TIA)\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-certified-threat-intelligence-analyst-ctia\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-certified-threat-intelligence-analyst-ctia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-certified-threat-intelligence-analyst-ctia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/CTIA-V2-1.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/CTIA-V2-1.jpg\",\"width\":500,\"height\":500,\"caption\":\"Learn to collect, analyze, and transform data into actionable intelligence to strengthen cyber defense with EC-Council Certified Threat Intelligence Analyst (C|TIA)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-certified-threat-intelligence-analyst-ctia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"EC-Council Certified Threat Intelligence Analyst (C|TIA)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EC-Council Certified Threat Intelligence Analyst (C|TIA) - ACG CyberAcademy","description":"Learn to collect, analyze, and transform data into actionable intelligence to strengthen cyber defense with EC-Council Certified Threat Intelligence Analyst (C|TIA)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/","og_locale":"en_GB","og_type":"article","og_title":"EC-Council Certified Threat Intelligence Analyst (C|TIA) - ACG CyberAcademy","og_description":"Learn to collect, analyze, and transform data into actionable intelligence to strengthen cyber defense with EC-Council Certified Threat Intelligence Analyst (C|TIA)","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2025-11-19T14:47:09+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIA-V2-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/","url":"https:\/\/acgcyberacademy.fr\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/","name":"EC-Council Certified Threat Intelligence Analyst (C|TIA) - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIA-V2-1.jpg","datePublished":"2025-02-14T15:42:21+00:00","dateModified":"2025-11-19T14:47:09+00:00","description":"Learn to collect, analyze, and transform data into actionable intelligence to strengthen cyber defense with EC-Council Certified Threat Intelligence Analyst (C|TIA)","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIA-V2-1.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/02\/CTIA-V2-1.jpg","width":500,"height":500,"caption":"Learn to collect, analyze, and transform data into actionable intelligence to strengthen cyber defense with EC-Council Certified Threat Intelligence Analyst (C|TIA)"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-certified-threat-intelligence-analyst-ctia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"EC-Council Certified Threat Intelligence Analyst (C|TIA)"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/16076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=16076"}],"version-history":[{"count":14,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/16076\/revisions"}],"predecessor-version":[{"id":20047,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/16076\/revisions\/20047"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/16119"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=16076"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=16076"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=16076"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=16076"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=16076"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=16076"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=16076"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=16076"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=16076"},{"taxonomy":"cpf","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/cpf?post=16076"},{"taxonomy":"organismes","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organismes?post=16076"},{"taxonomy":"organisme","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organisme?post=16076"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=16076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}