Leader dans le secteur des formations en cybersécurité.

EC-Council Certified Threat Intelligence Analyst (CTIA)

Catégorie
Taux satisfaction
4.9
Taux de réussite
4.9

Description

CTIA is a comprehensive specialist- level program that teaches a structured approach for building effective threat intelligence.

A program developed by threat intelligence experts from all over the world that is constantly updated to ensure that the students are exposed to the latest advances in the field of Threat Intelligence.

Target group

  • Threat Intelligence
  • Analysts/Specialists/Professionals/Engineers/Examiners/Associates
  • Threat Hunters
  • Threat Intelligence Platform Specialists/Engineers/Professionals/Associates
  • Threat Intelligence Managers/Architects/Leads/Vulnerability Management Managers
  • SOC Threat Intelligence Analyst/Specialists/Professionals
  • Pen Testers/Ethical Hackers
  • Security Practitioners/Engineers/Analysts/Specialists/Architects/Managers
  • Digital Forensic and Malware Analysts
  • Incident Response Team Members
  • Any mid-level to high-level cybersecurity professionals with a minimum of 3 years of experience
  • Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence
  • Individuals interested in preventing cyber threats

Program

  • Module 1 : Introduction to Threat Intelligence
  • Module 2 : Cyber Threats and Attack Frameworks
  • Module 3 : Requirements, Planning, Direction, and Review
  • Module 4 : Data Collection and Processing
  • Module 5 : Data Analysis
  • Module 6 : Intelligence Reporting and Dissemination
  • Module 7 : Threat Hunting and Detection
  • Module 8 : Threat Intelligence in SOC Operations, Incident Response, & Risk Management
 

Goal

  • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
  • Perform anti-forensic methods detection
  • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
  • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
  • Identify & check the possible source / incident origin.
  • Recover deleted files and partitions in Windows, Mac OS X, and Linux
  • Conduct reverse engineering for known and suspected malware files
  • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

Recommended

There are no prerequisites for attending the course, but to register for the exam, candidates must demonstrate at least three years of professional experience in the field of information security or software design.

Information importante :

Nos formations ne sont pas inscrites au Répertoire National des Certifications Professionnelles (RNCP), mais elles sont conformes aux exigences du Répertoire Spécifique (RS).

fr_FRFrench

Nous utilisons des cookies pour améliorer votre expérience. Consultez notre Politique de cookies et notre Politique de confidentialité.

Demande d'information

Je souhaute obtenir plus d'informations sur vos formations

ACG Cyberacademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.