Certified Threat Intelligence Analyst

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats.

Filtrování nabídky kurzů

Měna | EUR

Ve výběru ještě nebyly vypsány žádné termíny.

Target Group

This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. 

  • Threat Hunters
  • SOC Professionals
  • CIO, Security Manager
  • Network security & Site administrators
  • Individuals interested in preventing cyber threats
  • Computer Network Auditor (CNA),  Analyst (CNA), Defence (CND)
  • Infrastructure Support, IS/IT Specialist & Manager, Forensic Analyst
Target Group

What is C|TIA

C|TIA is a method-driven program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.

What is C|TIA

Learning Objectives

  • To differentiate threat intelligence professionals from other information security professionals
  • To enable individuals and organizations with the ability to prepare and run a threat intelligence program 
  • To provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability
  • To ensure that organizations have predictive capabilities rather than just proactive measures beyond active defense mechanism
  • To empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program


Certification

The C|TIA exam can be challenged post the completion of attending the complete official C|TIA course. Candidates that successfully pass the exam will receive their C|TIA certificate and membership privileges. Members are required to adhere to the policies of EC-Council’s Continuing Education Policy.

Certification

Harmonogram

První den
Skrýt agendu
Otevřít agendu

  • 09:00 – 10:30

    Modul 1 - Introduction 

    • Introduction to Treat Inteligence
    • Understanding Cyber Treat Inteligence
    • Overview of Threat Intelligence Lifecycle and Frameworks
  • 10:30 – 10:45

    Coffee break

  • 10:45 – 12:15

    Module 02 - Cyber Threats and Kill Chain Methodology

    Understanding Cyber Threats

    • Overview of Cyber Threats
    • Cyber Security Threat Categories
    • Threat Actors/Profiling the Attacker
    • Threat: Intent, Capability, Opportunity Triad
    • Motives, Goals, and Objectives of Cyber Security Attacks
    • Hacking Forums

  • 12:15 – 13:15

    Lunch Menu

  • 13:15 – 14:45

    Understanding Advanced Persistent Threats (APTs)

    • Advanced Persistent Threats (APTs)
    • Characteristics of Advanced Persistent Threats (APTs)
    • Advanced Persistent Threat Lifecycle
  • 14:45 – 15:00

    Coffee break

  • 15:00 – 17:00

    Understanding Cyber Kill Chain

    • Cyber Kill Chain Methodology
    •   Tactics, Techniques, and Procedures (TTPs)
    • Adversary Behavioral Identification
    •  Kill Chain Deep Dive Scenario - Spear Phishing 

    Understanding Indicators of Compromise (IoCs)

    • Indicators of Compromise (IoCs)
    • Why Indicators of Compromise Important?
    • Categories of IoCs
    • Key Indicators of Compromise
    • Pyramid of Pain

Druhý den
Skrýt agendu
Otevřít agendu

  • 09:00 – 10:30

    Module 03 - Requirements, Planning, Direction, and Review

    • Understading Organization's Current Threat Landscape
    • Understanding Requirements Analysis
    • Planning Threat Intelligence Program
    • Establishing Management Support
    • Building a Treat Intelligence Team
    • Overwiev a Treat Intelligence Team
    • Overwiev a Treat Intelligence Sharing

  • 10:30 – 10:45

    Coffee break

  • 10:45 – 12:15

    Reviewing Threat Intelligence Program

    • Threat Intelligence Led Engagement Revie
    •  Considerations for Reviewing Threat Intelligence Program
    •   Assessing the Success and Failure of the Threat Intelligence Program
  • 12:15 – 13:15

    Lunch Menu

  • 13:15 – 14:45

    Module 04: Data Collection and Processing

    • Overview of Threat Intelligence Data Collection
    • Overview of Treat Intelligence Collection Management
    • Overview of Threat Intelligence Feeds and Sources
    • Understanding Threat Intelligence Data Collection and Acquisition
  • 14:45 – 15:00

    Coffee break

  • 15:00 – 17:00

    Data Collection and Processing

    • Understanding Bulk Data Collection
    • Understanding Data Processing and Exploitation

Třetí den
Skrýt agendu
Otevřít agendu

  • 09:00 – 10:30

    Module 05: Data Analysis

    • Overwiev of Data Analysis
    • Understading of Data Analysis
    • Understading of Data Analysis Techniques
  • 10:30 – 10:45

    Coffee Break 

  • 10:45 – 12:15
    • Overview of Threat Analysis
    • Understanding Threat Analysis Process
    • Overview of Fine-Tuning Threat Analysis
    • Understanding Threat Intelligence Evaluation
    • Creating Runbooks and Knowledge Base
    • Overwiev of Threat Inteligence Tools
  • 12:15 – 13:15

    Lunch Menu

  • 13:15 – 14:45

    Module 06: Intelligence Reporting and Dissemination

    • Overview of Threat Intelligence Reports
    •  Introduction to Dissemination
    • Participating in Sharing Relationships
    • Overview of Sharing Threat Intelligence
    • Overview of Delivery Mechanisms
  • 14:45 – 15:00

    Coffee break

  • 15:00 – 17:00
    • Understanding Threat Intelligence Sharing Platforms
    •  Overview of Intelligence Sharing Acts and Regulations
    • Overview of Threat Intelligence Integration

    End

It is a highly interactive, comprehensive, standards-based, intensive 3-day training program that teaches information security professionals to build professional threat intelligence.

  • Délka bloku 45 minut
  • Vyučovacích hodin 2 hodin
  • Občerstvení YES
  • Zkouška YES

Exam Format

C|TIA allows cybersecurity professionals to demonstrate their mastery of the knowledge and skills required for threat intelligence 

  • Duration: 2 hours
  • Passing Score: 70%
  • Number of Questions: 50
  • Test Format: Multiple Choice
  • Availability: EC-Council Exam Portal
Exam Format

Jak kurz hodnotí absolventi?

V čem jsou naše reference výjimečné? Nejsou to jednorázové akce. K nám se lidé vrací rádi a nezavírají před námi dveře.

Podívejte se na úplný seznam referenčních klientů, kteří na nás nedají dopustit.

Vaše hodnocení
*****

Chcete to připravit na míru? Kontaktujte nás!

Zavolejte nám a my vám poradíme.

Jsme vám k dispozici na telefonním čísle +420 222 553 101 vždy od pondělí do pátku: 9:00 - 17:00.

*položky označené hvězdičkou jsou povinné

Chcete získat dárek k narozeninám?