Leader dans le secteur des formations en cybersécurité.

EC-Council Certified Threat Intelligence Analyst (C|TIA)

Catégorie
Taux satisfaction
4.9
Taux de réussite
4.9

Description

EC-Council’s Certified Threat Intelligence Analyst (C|TIA) Certification is a comprehensive specialist-level professional program focused on the ever-evolving domain of threat intelligence. The program is designed for individuals involved in collecting, analyzing, and disseminating threat intelligence information.


C|TIA covers various topics, including the fundamentals of threat intelligence, the use of threat intelligence tools and techniques, and the development of a threat intelligence program. This course focuses on refining data and information into actionable intelligence that can be used to prevent, detect, and monitor cyber-attacks. It addresses all stages involved in the threat intelligence lifecycle, and this attention toward a realistic and futuristic approach makes it one of the most comprehensive threat intelligence certifications in the market today.


The program provides credible professional insights required for a successful threat intelligence career and enhances your overall skills, thus increasing your employability. It is desired by most cybersecurity engineers, analysts, and professionals globally and is respected by hiring authorities. Ideal for individuals working in information security, network security, incident response, and other related fields. Mastering skills and earning this certification can help enhance threat intelligence operations and investments for cybersecurity individuals and teams.

Target group

  • Mid-level to high-level cybersecurity professionals with a minimum of three years of experience.
  • Individuals with EC-Council’s C|EH and C|ND certifications can enroll in this

Training Program

Module 01 : Introduction to Threat Intelligence
  • Understand Intelligence
  • Summarize Cyber Threat Intelligence Concepts
  • Explain Threat Intelligence Lifecycle and Frameworks
  • Understand Threat Intelligence Platforms (TIPs)
  • Understand Threat Intelligence in the Cloud Environment
  • Understand Future Trends and Continuous Learning
  • Understand Cyber Threats
  • Explain Advanced Persistent Threats
  • Explain Cyber Kill Chain
  • Explain MITRE ATT&CK and Diamond Model
  • Understand Indicators of Compromise
  • Understand the Organization’s Current Threat Landscape
  • Understand Requirements Analysis
  • Plan a Threat Intelligence Program
  • Establish Management Support
  • Build a Threat Intelligence Team
  • Understand Threat Intelligence Sharing
  • Review Threat Intelligence Program
  • Understand Threat Intelligence Data Collection
  • Summarize Threat Intelligence Collection Management
  • Explain Threat Intelligence Feeds and Sources
  • Explain Threat Intelligence Data Collection and Acquisition
  • Understand Bulk Data Collection
  • Explain Data Processing and Exploitation
  • Understand Threat Data Collection and Enrichment in Cloud Environments
  • Summarize Data Analysis
  • Explain Data Analysis Techniques
  • Understand Threat Analysis
  • Demonstrate Threat Analysis Process
  • Explain Fine-tuning Threat Analysis
  • Understand Threat Intelligence Evaluation
  • Create Runbooks and Knowledge Base
  • Use Threat Intelligence Tools
  • Understand Threat Intelligence Reports
  • Understand Dissemination
  • Participate in Sharing Relationships
  • Understand Sharing Threat Intelligence
  • Explain Delivery Mechanisms
  • Use Threat Intelligence Sharing Platforms
  • Understand Intelligence Sharing Acts and Regulations
  • Explain Threat Intelligence Integration
  • Understand Intelligence Sharing and Collaboration using Python Scripting
  • Summarize Threat Hunting Concepts
  • Understand Threat Hunting Automation
  • Understand Threat Intelligence in SOC Operations
  • Understand Threat Intelligence in Risk Management
  • Understand Threat Intelligence in Incident Response

Goal

  • Gain skills for performing various types of threat intelligence 
  • Learn various data collection techniques from multiple sources and feeds
  • Emphasis on collection, creation, and dissemination of Indicators of Compromise (IoCs) in various formats
  • Gain proficiency in developing a structured approach for performing threat analysis and threat intelligence evaluation.
  • Learn various techniques for threat intelligence reporting and dissemination
  • Know the latest threat intelligence tools/platforms and frameworks
  • Know how to perform threat intelligence through Python Scripting
  • Gain skills in threat hunting and detection
  • Learn threat intelligence in SOC Operations, Incident Response, and Risk Management
  • Enhance your threat intelligence skills in the cloud environment
  • Based on a comprehensive industry-wide Job Task Analysis (JTA)

Recommended

There are no formal prerequisites to attend the CTIA v2 training. However, to be eligible for the certification exam, candidates must have at least three years of professional experience in cybersecurity or software development.

Training Program

Réservez maintenant

Information importante :

Nos formations ne sont pas inscrites au Répertoire National des Certifications Professionnelles (RNCP), mais elles sont conformes aux exigences du Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

Nous utilisons des cookies pour améliorer votre expérience. Consultez notre Politique de cookies et notre Politique de confidentialité.

Demande d'information

Je souhaute obtenir plus d'informations sur vos formations

ACG Cyberacademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.