CTIA – EccouncilJuly 27, 2022 2022-08-11 12:42
CTIA – Eccouncil
Certified Threat Intelligence Analyst - Ec Council
Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. “Threat intelligence” (TI) is evidence-based knowledge — including context, mechanisms, indicators, implications and actionable advice — about an existing or emerging menace or hazard to IT or information assets. It can be used to inform decisions regarding the subject’s response to that menace or hazard
86+ already registered
more than 97% of scored secured by past students
This CTIA (certified threat intelligence Analyst) program offered by SiemHunters in partnership with EC Council. it helps to learn enterprised level Threat intelligence techniques and tactics used to identify the adversaries and helps to analyze root-cause of the incidents, This program focuses on real-world threat intelligence scenarios and as a part of the soc investigations how trheat expert helps to deal with intelligence and find the tactics of the incidents. This program majorly focusing on risk management, incident response, Threat intelligence, Cyber threats and threat factors, log investigations using SIEM tools.
This Program delivered by our Industrial expert in the areas of SIEM, SOC, Threat hunting, and Intelligence.
Become an Threat Intelligence Analyst..!
Start to Success
#enterprise scenario based training
SiemHunters is a unit of Cyberloop & Pentesterzone. We are provide enterprise based training and lab scenarios, We have 10+ industrial certified instructor team to delivery Ec Council courses and certifications.
The Certified Threat Intelligence Analyst (CTIA) program is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe. The aim is to help organizations hire qualified cyber intelligence trained professionals to identify and mitigate business risks by converting unknown internal and external threats into quantifiable threat entities and stop them in their tracks.
Key Features of CTIA
Lesson 1 : Understanding Intelligence
Lesson 2 : Understanding Cyber Threat Intelligence
Lesson 3 : Overview of Threat Intelligence Lifecycle and Frameworks
Learn: understanding intelligence,cyber threat intelligence,overview of threat intelligence lifecycle and frameworks
Lesson 1 : Understanding Cyber Threats
Lesson 2 : Understanding Advanced Persistent Threats (APTs)
Lesson 3 : Understanding Cyber Kill Chain
Lesson 4 : Understanding Indicators of Compromise (IoCs)
Learn: understanding cyber threats,APTs,understanding cyber kill chain and IOCs
Lesson 1 : Understanding Organization’s Current Threat Landscape
Lesson 2 : Understanding Requirements Analysis
Lesson 3 : Planning Threat Intelligence Program
Lesson 4 : Establishing Management Support
Lesson 5 : Building a Threat Intelligence Team
Lesson 6 : Overview of Threat Intelligence Sharing
Lesson 7 : Reviewing Threat Intelligence Program
Learn: understanding organizations current threat landscape and requirements analysis,planning threat intelligence program,establishing management support,building a threat intelligece team,overview of threat intelligence sharing,reviewing threat intelligence program
Lesson 1 : Overview of Threat Intelligence Data Collection
Lesson 2 : Overview of Threat Intelligence Collection Management
Lesson 3 : Overview of Threat Intelligence Feeds and Sources
Lesson 4 : Understanding Threat Intelligence Data Collection and Acquisition
Lesson 5 : Understanding Bulk Data Collection
Lesson 6 : Understanding Data Processing and Exploitation
Learn: overview of threat intelligence data collection,collection management,feeds and sources,understanding threat intelligence data collection and acquisition,bulk data collection,data processing and exploitation
Lesson 1 : Overview of Data Analysis
Lesson 2 : Understanding Data Analysis Techniques
Lesson 3 : Overview of Threat Analysis
Lesson 4 : Understanding Threat Analysis Process
Lesson 5 : Overview of Fine-Tuning Threat Analysis
Lesson 6 : Understanding Threat Intelligence Evaluation
Lesson 7 : Creating Runbooks and Knowledge Base
Lesson 8 : Overview of Threat Intelligence Tools
Learn: overview of data analysis, threat analysis,understanding data analysis techniques,understanding threat analysis process,overview of fine-tuning threat analysis,understanding threat intelligence evaluation ,creating runbooks and knowledge base,overview of threat intelligence tools
Lesson 1 : Overview of Threat Intelligence Reports
Lesson 2 : Introduction to Dissemination
Lesson 3 : Participating in Sharing Relationships
Lesson 4 : Overview of Sharing Threat Intelligence
Lesson 5 : Overview of Delivery Mechanisms
Lesson 6 : Understanding Threat Intelligence Sharing Platforms
Lesson 7 : Overview of Intelligence Sharing Acts and Regulations
Lesson 8 : Overview of Threat Intelligence Integration
Learn: overview of threat intelligence reports,introduction to dissemination,participating in sharing relationships,overview of sharing threat intelligence,delivery mechanisms,sharing acts and regulations,intelligence integration,understanding threat intelligence sharig platforms.
Certified Threat Intelligence Analyst Details
Certification & Training
Certification & Self Learning
Certification & Training
New era of Job searching..!
We have our own dedicated job site only for cyber security & SOC connected to the large no of cyber security industries and help cyber folks to get their dream jobs in cyber security field.
This application already connected to more than 100+ cyber security companies and our dedicated team post jobs & remind you.