EC Council: Certified Threat Intelligence Analyst (CTIA) & Exam

Document created by Megan Henderson Employee on Jan 17, 2019Last modified by Dihanna Thomas on Feb 28, 2019
Version 3Show Document
  • View in full screen mode

Request Schedule 

 

 

In order to register for a class, you need to first create an EMC account

If you need further assistance, contact us

 

Overview

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats.

C|TIA is a method-driven program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.

This attention to a realistic and futuristic approach makes C|TIA one of the most comprehensive threat intelligence certifications on the market today. This program provides the solid, professional knowledge that is required for a career in threat intelligence, and enhances your skills as a Threat Intelligence Analyst, increasing your employ-ability.

 

 

Audience

Ethical Hackers, Security Practitioners, Threat Intelligence Analysts, Associates, Researchers, Threat Hunters, SOC Professionals, Digital Forensic and Malware Analysts, Incident Response Team Members, Individuals interested in preventing cyber threats

 

Duration

3 days (ILT)

 

Prerequisite Knowledge/Skills

Students should be familiar with the following: A minimum of 2 years working experience in information security.

 

Course Objectives

Upon successful completion of this course, participants should be able to:

  • Use a method-driven holistic approach to identify and mitigate business risks
  • Demonstrate mastery of the knowledge and skills required for threat intelligence

 

Course Outline

Introduction to Threat Intelligence

Cyber Threats and Kill Chain Methodology

Requirements, Planning, Direction, and Review

Data Collection and Processing

Data Analysis

Intelligence Reporting and Dissemination

 

Request Schedule 

 

 

In order to register for a class, you need to first create an EMC account

If you need further assistance, contact us

Attachments

Outcomes