Certified Threat Intelligence Analyst [CTIA]

Download in PDF:    This Course   

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence.

In the ever-changing threat landscape, C|TIA is an essential program for those who deal with cyber threats on a daily basis. Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.

Who should attend

The CTIA program is designed for all IT professionals involved with information system security, Ethical Hackers,Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers, Threat Intelligence Analysts,Associates, Researchers, Consultants Threat Hunters, SOC Professionals, Digital Forensic and Malware Analysts, Incident Response Team Members, Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats.

CTIA Certification Track

Exams Exam Code Recommended Training
 CTIA   312-85   EC-Council CTIA

Training we offer:

Course Name  EC-Council CTIA 
Course Duration  3 days (8hrs/day) or 6 days (4hrs/day)  
Course Mode  Training Academy or On-site Training for Corporates & Colleges

CTIA Syllabus

  1. Introduction to Threat Intelligence
  2. Cyber Threats and Kill Chain Methodology
  3. Requirements, Planning, Direction, and Review
  4. Data Collection and Processing
  5. Data Analysis
  6. Intelligence Reporting and Dissemination