- Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
- Perform anti-forensic methods detection
- Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
- Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
EC-Council Certified Threat Intelligence Analyst (CTIA)
Taux satisfaction
4.9
Taux de réussite
4.9


Description
CTIA is a comprehensive specialist- level program that teaches a structured approach for building effective threat intelligence.
A program developed by threat intelligence experts from all over the world that is constantly updated to ensure that the students are exposed to the latest advances in the field of Threat Intelligence.
Target group
- Threat Intelligence
- Analysts/Specialists/Professionals/Engineers/Examiners/Associates
- Threat Hunters
- Threat Intelligence Platform Specialists/Engineers/Professionals/Associates
- Threat Intelligence Managers/Architects/Leads/Vulnerability Management Managers
- SOC Threat Intelligence Analyst/Specialists/Professionals
- Pen Testers/Ethical Hackers
- Security Practitioners/Engineers/Analysts/Specialists/Architects/Managers
- Digital Forensic and Malware Analysts
- Incident Response Team Members
- Any mid-level to high-level cybersecurity professionals with a minimum of 3 years of experience
- Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence
- Individuals interested in preventing cyber threats
Program
- Duration : 3 days
- Module 1 : Introduction to Threat Intelligence
- Module 2 : Cyber Threats and Attack Frameworks
- Module 3 : Requirements, Planning, Direction, and Review
- Module 4 : Data Collection and Processing
- Module 5 : Data Analysis
- Module 6 : Intelligence Reporting and Dissemination
- Module 7 : Threat Hunting and Detection
- Module 8 : Threat Intelligence in SOC Operations, Incident Response, & Risk Management
Goal
- Identify & check the possible source / incident origin.
- Recover deleted files and partitions in Windows, Mac OS X, and Linux
- Conduct reverse engineering for known and suspected malware files
- Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
Recommended
There are no prerequisites for attending the course, but to register for the exam, candidates must demonstrate at least three years of professional experience in the field of information security or software design.
- Langue : Anglais
- Organisme de certification : EC-Council
- Certification : Oui
- Accesibilité : Oui
- Durée : 5 Jours
Information importante :
Nos formations ne sont pas inscrites au Répertoire National des Certifications Professionnelles (RNCP), mais elles sont conformes aux exigences du Répertoire Spécifique (RS).