CTIA – Eccouncil

Certified Threat Intelligence Analyst - Ec Council​

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. “Threat intelligence” (TI) is evidence-based knowledge — including context, mechanisms, indicators, implications and actionable advice — about an existing or emerging menace or hazard to IT or information assets. It can be used to inform decisions regarding the subject’s response to that menace or hazard


86+ already registered

more than 97% of scored secured by past students

This CTIA (certified threat intelligence Analyst) program offered by SiemHunters in partnership with EC Council. it helps to learn enterprised level Threat intelligence techniques and tactics used to identify the adversaries and helps to analyze root-cause of the incidents, This program focuses on real-world threat intelligence scenarios and as a part of the soc investigations how trheat expert helps to deal with intelligence and find the tactics of the incidents. This program majorly focusing on risk management, incident response, Threat intelligence, Cyber threats and threat factors, log investigations using SIEM tools. 

This Program delivered by our Industrial expert in the areas of SIEM, SOC, Threat hunting, and Intelligence. 

Program Overview

Become an Threat Intelligence Analyst..!

Start to Success

#enterprise scenario based training

SiemHunters is a unit of Cyberloop & Pentesterzone. We are provide enterprise based training and lab scenarios, We have 10+ industrial certified instructor team to delivery Ec Council courses and certifications.

The Certified Threat Intelligence Analyst (CTIA) program is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe. The aim is to help organizations hire qualified cyber intelligence trained professionals to identify and mitigate business risks by converting unknown internal and external threats into quantifiable threat entities and stop them in their tracks.

Key Features of CTIA

60+ Hours of Instructor Led Training

Flexible timings

40+ Enterprised tools & ilab access

Exam Voucher Included

Dedicated Job portal

Self-Learning Access

Learning Path

Lesson 1 : Understanding Intelligence
Lesson 2 : Understanding Cyber Threat Intelligence
Lesson 3 : Overview of Threat Intelligence Lifecycle and Frameworks

Learn: understanding intelligence,cyber threat intelligence,overview of threat intelligence lifecycle and frameworks

Lesson 1 : Understanding Cyber Threats
Lesson 2 : Understanding Advanced Persistent Threats (APTs)
Lesson 3 : Understanding Cyber Kill Chain
Lesson 4 : Understanding Indicators of Compromise (IoCs)

Learn: understanding cyber threats,APTs,understanding cyber kill chain and IOCs

Lesson 1 : Understanding Organization’s Current Threat Landscape
Lesson 2 : Understanding Requirements Analysis
Lesson 3 : Planning Threat Intelligence Program
Lesson 4 : Establishing Management Support
Lesson 5 : Building a Threat Intelligence Team
Lesson 6 : Overview of Threat Intelligence Sharing
Lesson 7 : Reviewing Threat Intelligence Program

Learn: understanding organizations current threat landscape and requirements analysis,planning threat intelligence program,establishing management support,building a threat intelligece team,overview of threat intelligence sharing,reviewing threat intelligence program

Lesson 1 : Overview of Threat Intelligence Data Collection
Lesson 2 : Overview of Threat Intelligence Collection Management
Lesson 3 : Overview of Threat Intelligence Feeds and Sources
Lesson 4 : Understanding Threat Intelligence Data Collection and Acquisition
Lesson 5 : Understanding Bulk Data Collection
Lesson 6 : Understanding Data Processing and Exploitation

Learn: overview of threat intelligence data collection,collection management,feeds and sources,understanding threat intelligence data collection and acquisition,bulk data collection,data processing and exploitation

Lesson 1 : Overview of Data Analysis
Lesson 2 : Understanding Data Analysis Techniques
Lesson 3 : Overview of Threat Analysis
Lesson 4 : Understanding Threat Analysis Process
Lesson 5 : Overview of Fine-Tuning Threat Analysis
Lesson 6 : Understanding Threat Intelligence Evaluation
Lesson 7 : Creating Runbooks and Knowledge Base
Lesson 8 : Overview of Threat Intelligence Tools

Learn: overview of data analysis, threat analysis,understanding data analysis techniques,understanding threat analysis process,overview of fine-tuning threat analysis,understanding threat intelligence evaluation ,creating runbooks and knowledge base,overview of threat intelligence tools

Lesson 1 : Overview of Threat Intelligence Reports
Lesson 2 : Introduction to Dissemination
Lesson 3 : Participating in Sharing Relationships
Lesson 4 : Overview of Sharing Threat Intelligence
Lesson 5 : Overview of Delivery Mechanisms
Lesson 6 : Understanding Threat Intelligence Sharing Platforms
Lesson 7 : Overview of Intelligence Sharing Acts and Regulations
Lesson 8 : Overview of Threat Intelligence Integration

Learn: overview of threat intelligence reports,introduction to dissemination,participating in sharing relationships,overview of sharing threat intelligence,delivery mechanisms,sharing acts and regulations,intelligence integration,understanding threat intelligence sharig platforms.

Tools Covered

100+ Enterprised tools & cloud based tools

Certified Threat Intelligence Analyst Details

Target Audience

CTIA Certification does not require any prerequisite

Threat Intelligence Analyst
SOC Analyst
Incident Response
Forensics Manager
SOC Analyst L3

CSA v1 - Ec Council

109+ lessons - 32+ hours
View Course

Exam Information

For EC-Council Certified SOC Analyst (CSA) certification

Certification Name:  312-85 (ECC EXAM), 312-85 (VUE)
Test Format: Multiple Choice
Number of Questions: 50
Test Duration: 2 Hours

Self - Learning Access

109+ lessons - 32+ hours
View Course

Learning Options

Classroom training


Certification & Training

Self-Learning Access


Certification & Self Learning

Enterprise Training


Certification & Training

New era of Job searching..!

We have our own dedicated job site only for cyber security & SOC connected to the large no of cyber security industries and help cyber folks to get their dream jobs in cyber security field. 

This application already connected to more than 100+ cyber security companies and our dedicated team post jobs & remind you.

FAQ's about CTIA

what type of training modes available in SiemHunters..?

SiemHunters is a Unit of cyberloop & Pentesterzone offers Instructor-Led training, Live Classroom, On-demand and Self paced. most of the attendees choose live classroom training and on-demand.

Where can i take ec council exams?

SiemHunters offers ec council training and certifications in Hyderabad and Vijayawada. currently, you can attend exams in-house under our proctor vision. 

How do i become a CTIA - certified Threat Professional..?

To become a certified ethical hacker, you’ll want to follow these steps:

1. register at siemhunters Training center

2. choose your mode of training

3. Complete your training and doing all exercises with our own enterprise labs

4. Attend the exam in our center (ECC)

5. once you pass in exam, you will become a certified Threat Analyst

After CSA, what type of roles i expected?

After earn your CSA certifications. you are officially certified Professional and also called as a security analyst. this below are the roles after CSA in global IT.

SOC Analyst L1 & L2

Cyber Security Analyst

Forensics Investigator

Incident Response

Malware Analyst

How SiemConnect works..?

SiemConnect already working with 100+ cyber security organizations, it helps to apply internships, cyber security jobs, and siem jobs also

how are our instructors?

All of our Highly qualified trainers are CEI certified with 10 + years of experience in global corporates in the areas of Security domain.

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
  • Attributes
  • Custom attributes
  • Custom fields
Click outside to hide the compare bar
Connect with our expert
Need help.? Contact our
Scan the code
Hi Welcome to SiemHunters learning platform