Ignit Logo

Certified Threat Intelligence Analyst | E-learning

E-learning (Self-Paced): 800€ + IVA

REF: eCTIA Catálogo: EC-Council Área: EC-Council Cybersecurity

Duração icon

Duração:

12 meses

Próxima Data icon

Próxima Data:

Consulte-nos

Local icon

Local:

Descrição

EC-Council’s Certified Threat Intelligence Analyst (C|TIA) certification is a comprehensive specialist-level professional program focused on the ever-evolving domain of threat intelligence. The program is designed for individuals involved in collecting, analyzing, and disseminating threat intelligence information.

C|TIA covers a wide range of topics, including the fundamentals of threat intelligence, the use of threat intelligence tools and techniques, and the development of a threat intelligence program. The cyber threat intelligence course focuses on refining data and information into actionable intelligence that can be used to prevent, detect, and monitor cyber-attacks. The program addresses all the stages involved in the threat intelligence lifecycle, and this attention toward a realistic and futuristic approach makes C|TIA one of the most comprehensive threat intelligence certifications in the market today.

C|TIA program provides credible professional knowledge required for a successful threat intelligence career. It enhances your skills as a threat intelligence analyst, thus increasing your employability. It is desired by most cybersecurity engineers, analysts, and professionals globally and is respected by hiring authorities. Ideal for individuals working in information security, network security, incident response, and other related fields, mastering in-demand skills and earning this certification will improve threat intelligence operations and investments for cybersecurity individuals and teams.

This course includes:

  • Instructor-led, streaming video training modules- 1 year access
  • Official EC-Council e-courseware 1 year access iLabs, virtual lab platform – 6 months access
  • Certificate of Attendance
  • Certification Exam Voucher

More Details:

  • Access keys must be redeemed within 12 months of purchase
  • This is single user license and may not be shared
  • The duration of EC-Council e-learning courses is 12 months, but pay attention you only have access to ILabs for 6 months.
  • We recommend completing them in 3 months for better results.

Destinatários

  • Mid-level to high-level cybersecurity professionals with a minimum of three years of experience
  • Individuals with EC-Council´s C|EH and C|ND certifications can enroll in this course
  • Área: EC-Council

  • Certificação Associada: C|TIA EXAM

Quero inscrever-me.

Programa:

Module 1: Introdution to Threat Intelligence

Lessons:

  • Intelligence
  • Cyber Threat Intelligence Concepts
  • Threat Intelligence Lifecycle and Frameworks
  • Threat Intelligence Platforms (TIPs)
  • Threat Intelligence in the Cloud Environment
  • Future Trends and Continuous Learning

Module 2: Cyber Threats and Attack Frameworks

Lessons:

  • Cyber Threats
  • Advanced Persistent Threats
  • Cyber Kill Chain
  • MITRE ATT&CK and Diamond Model
  • Indicators of Compromise

Module 3: Requirements, Planning, Direction, and Review

Lessons:

  • Organization’s Current Threat Landscape
  • Requirements Analysis
  • Plan a Threat Intelligence Program
  • Establish Management Support
  • Build a Threat Intelligence Team
  • Threat Intelligence Sharing
  • Review Threat Intelligence Program

Module 4: Data Collection and Processing

Lessons:

  • Threat Intelligence Data Collection
  • Threat Intelligence Collection Management
  • Threat Intelligence Feeds and Sources
  • Threat Intelligence Data Collection and Acquisition
  • Bulk Data Collection
  • Data Processing and Exploitation
  • Threat Data Collection and Enrichment in Cloud Environments

Module 5: Data Analysis

Lessons:

  • Data Analysis
  • Data Analysis Techniques
  • Threat Analysis
  • Threat Analysis Process
  • Fine-Tuning Threat Analysis
  • Threat Intelligence Evaluation
  • Create Runbooks and Knowledge Base
  • Threat Intelligence Tools

Module 6: Intelligence Reporting and Dissemination

Lessons:

  • Threat Intelligence Reports
  • Dissemination
  • Participate in Sharing Relationships
  • Sharing Threat Intelligence
  • Delivery Mechanisms
  • Threat Intelligence Sharing Platforms
  • Intelligence Sharing Acts and Regulations
  • Threat Intelligence Integration
  • Threat Intelligence Sharing and Collaboration using Python Scripting

Module 7: Threat Hunting and Detection

Lessons:

  • 7.1 Threat Hunting Concepts
  • 7.2 Threat Hunting Automation

Module 8: Threat Intellingence in SOC Operations, Incident Response, and Risk Management

Lessons:

  • Threat Intelligence in SOC Operations
  • Threat Intelligence in Risk Management
  • Threat Intelligence in Incident Response

Pré-requisitos:

N/A

Quero inscrever-me.

Partilha:

We meet future and then we make it spark slogan

Precisas de ajuda a encontrar o teu futuro?

A background of the Ignit sparks