CPENT
July 21, 2022 2022-08-01 14:21CPENT
Certified Threat Intelligence Analyst - Ec Council
Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. “Threat intelligence” (TI) is evidence-based knowledge — including context, mechanisms, indicators, implications and actionable advice — about an existing or emerging menace or hazard to IT or information assets. It can be used to inform decisions regarding the subject’s response to that menace or hazard
210+ already registered
more than 97% of scored secured by past students
Become an Intelligence Analyst..!
Start to Success
#enterprise scenario based training
SiemHunters is a unit of Cyberloop & Pentesterzone. We are provide enterprise based training and lab scenarios, We have 10+ industrial certified instructor team to delivery Ec Council courses and certifications.
The Certified Threat Intelligence Analyst (CTIA) program is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe. The aim is to help organizations hire qualified cyber intelligence trained professionals to identify and mitigate business risks by converting unknown internal and external threats into quantifiable threat entities and stop them in their tracks
Course overview
Skills Covered
- Primary issues threatening
- risk management, incident response, and SIEM
- Cyber threats and threat factors
- DNIF threat analysis
- capabilities, strategy, lifecycle
- DNIF log monitoring
- Advanced Persistent Threat (APT) lifecycle
- Threat Intelligence
- Threat analysis
- Tools for threat intelligence, threat modeling, data analysis
Course Outline:
Contact US
+91 - 9381203090
SiemHunters Vision
- Dedicated virtual labs - 24/7
- Self-learning portal with 30+ courses
- AWS labs & Job portal
- 1:1 Instructor support
- Interview preparation & unlimited tests
- 10+ years of experience trainers
Successful completion of the CTIA certification training empowers you with across the board understanding of:
- Primary issues threatening the information security world
- Role of threat intelligence
- Implementing threat intelligence in risk management, incident response, and SIEM
- Cyber threats and threat factors
- Objectives of diverse cybersecurity attacks
- Basics of threat intelligence including types, capabilities, strategy, lifecycle, maturity model, and frameworks
- Implementing the cyber kill chain methodology
- Advanced Persistent Threat (APT) lifecycle
- Tactics, Techniques, and Procedures (TTPs)
- Indicators of Compromise (IOS) and the pyramid of pain
- Steps to Planning a threat intelligence program including taking requirements, planning, directing, and review
- Types of data feeds and methods to collect data
- Threat intelligence data collection by using Cyber Counterintelligence (CCI), Open Source Intelligence (OSINT), Human Intelligence (HUMINT), and Indicators of Compromise (IOS)
- Bulk data collection, data structuring, processing, normalizing, sampling, storing, and creating visualizations
- Types of data analysis techniques such as Statistical Data Analysis, Analysis Structured Analysis of Competing Hypotheses (SACH), and of Competing Hypotheses (ACH)
- Threat analysis process including threat modeling, evaluation, fine-tuning, creating a knowledge base and runbook
- Threat intelligence dissemination, dissemination preferences
- Intelligence collaboration and Malware analysis
- Types of TI exchange and threat intelligence sharing formats
- Tools for threat intelligence, threat modeling, data analysis
- Disseminating threat intelligence and sharing protocols, dissemination preferences, sharing rules and models, intelligence collaboration
- TI exchange architecture and types, sharing relationships
- threat intelligence standards and formats for sharing
- Threat intelligence reporting
- Platforms and regulations to share operational, strategic, tactical, and technical intelligence
- Introduction to Threat Intelligence
- Cyber Threats and Kill Chain Methodology
- Requirements, Planning, Direction, and Review
- Data Collection and Processing
- Data Analysis
- Intelligence Reporting and Dissemination
- Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers
- Threat Intelligence Analysts, Associates, Researchers, Consultants
- Threat Hunters
- SOC Professionals
- Digital Forensic and Malware Analysts
- Incident Response Team Member
Certification Name | Certified Threat Intelligence Analyst Exam Code 312-85 |
Test Format | Multiple choice questions |
No of question | 50 |
Test Duration | 2 hours |
Passing Score | 70% |
Learning Options
Classroom training
₹32500/-
Certification & Training
- 50 Hours of Training - in person
- 24/7 Instructor support
- 100+ Tools and Enterprised lab scenarios
- Life time Self-Learning access (180+ videos include labs)
- Exam Voucher included & Support
- Job support with dedicated job portal
Self-Learning Access
₹26500/-
Certification & Self Learning
- 290+ videos access (Life time)
- 24/7 Instructor support
- 6+ months Enterprised lab access & aws access also.
- In exam support & Proctor support
- Exam Voucher included & Support
- Job support with dedicated job portal
Enterprise Training
--
Certification & Training
- 80 Hours of Training (8 hours/day)
- 24/7 Instructor support
- 100+ Tools and Enterprised lab scenarios
- Life time Self-Learning access (180+ videos include labs)
- Exam Voucher included & Support
- Job support with dedicated job portal
Target Audience
- Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers
- Threat Intelligence Analysts, Associates, Researchers, Consultants
- Threat Hunters
- SOC Professionals
- Digital Forensic and Malware Analysts
- Incident Response Team Member
CTIA Course Features
Certification Name | Certified Threat Intelligence Analyst Exam Code 312-85 |
Test Format | Multiple choice questions |
No of question | 50 |
Test Duration | 2 hours |
Passing Score | 70% |
New era of Job searching..!
We have our own dedicated job site only for cyber security & SOC connected to the large no of cyber security industries and help cyber folks to get their dream jobs in cyber security field.
This application already connected to more than 100+ cyber security companies and our dedicated team post jobs & remind you.
FAQ's about CTIA
what type of training modes available in SiemHunters..?
SiemHunters is a Unit of cyberloop & Pentesterzone offers Instructor-Led training, Live Classroom, On-demand and Self paced. most of the attendees choose live classroom training and on-demand.
Where can i take ec council exams?
SiemHunters offers ec council training and certifications in Hyderabad and Vijayawada. currently, you can attend exams in-house under our proctor vision.
How do i become a CTIA - certified Threat Professional..?
To become a certified ethical hacker, you’ll want to follow these steps:
1. register at siemhunters Training center
2. choose your mode of training
3. Complete your training and doing all exercises with our own enterprise labs
4. Attend the exam in our center (ECC)
5. once you pass in exam, you will become a certified Threat Analyst
After CSA, what type of roles i expected?
After earn your CSA certifications. you are officially certified Professional and also called as a security analyst. this below are the roles after CSA in global IT.
SOC Analyst L1 & L2
Cyber Security Analyst
Forensics Investigator
Incident Response
Malware Analyst
How SiemConnect works..?
SiemConnect already working with 100+ cyber security organizations, it helps to apply internships, cyber security jobs, and siem jobs also
how are our instructors?
All of our Highly qualified trainers are CEI certified with 10 + years of experience in global corporates in the areas of Security domain.