Certified Threat Intelligence Analyst (CTIA)

TRAINING SERVICES

Course Delivery

This courses are available in the following formats:

For inquiries about corporate training and special discount packages, please contact us at info@sadensolutions.com

CERTIFIED THREAT INTELLIGENCE ANALYST (CTIA)

24 hours training

Course Overview

It is a course designed to identify and mitigate business risks by converting unknown internal and external threats into known threats. A careful business mission analysis (JTA) of the role roles involved in the threat intelligence field will also be discussed. This program distinguishes intelligence professionals as a threat from other information security professionals.

Course Objectives

After completing this course, you should be able to understand:

  • Key issues plaguing the information security world
  • Importance of threat intelligence in risk management, SIEM, and incident response
  • Various types of cyber threats, threat actors and their motives, goals, and objectives of cybersecurity attacks
  • Fundamentals of threat intelligence (including threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, etc.)
  • Cyber kill chain methodology, Advanced Persistent Threat (APT) lifecycle, Tactics, Techniques, and Procedures (TTPs), Indicators of compromise (loCs), and pyramid of pain.
  • Various steps involved in planning a threat intelligence program (Requirements, Planning, Direction, and Review) 
  • Different Types of data feeds, sources and data collection methods
  • Threat intelligence data collection and acquisition through Open-Source intelligence (OSINT), Human intelligence (HUMINT), Cyber counterintelligence (CCI), Indicators of Compromise (loCs), and malware analysis.
  • Bulk data collection and management (data processing, structuring, normalization, sampling, storing and visualization)
  • Different data analysis types and techniques including statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.
  • Compare threat analysis process which includes threat modeling, fine-tuning, evaluation, runbook, and knowledge base creation
  • Different data analysis, threat modeling, and threat intelligence tools
  • Threat intelligence dissemination and sharing protocol including dissemination preferences, intelligence collaboration, sharing rules and models, IT exchange types and architectures, participating in sharing relationships, standards, and formats for sharing threat intelligence
  • Creating effective threat intelligence reports
  • Different threat intelligence sharing platforms, acts, and regulations for sharing strategic, tactical, operational, and technical intelligence 

Course Prerequisites

There are no prerequisites to take the CTIA course.

EXPLORE OUR PROFESSIONAL AGILE CERTIFICATION COURSES

Certification For Build Your Future

flter by cat
No schedules was found
x

    wpChatIcon
    wpChatIcon