Certified Threat Intelligence Analyst (CTIA) (SF)
About This Course
This is a 3-day course which will help students gain in-depth knowledge and skills in planning a threat intelligence project, performing threat data collection from various sources and feeds, performing bulk data collection and data normalization, performing data analysis and threat intelligence evaluation, writing threat intelligence reports, and disseminating threat intelligence.
The course is built after a rigorous job task analysis (JTA) of the job roles involved in the field of threat intelligence. It is method driven that presents a holistic approach covering vast concepts related to organizational threat intelligence, from preparation of the threat intelligence project plan to building and disseminating threat intelligence.
40% of training time is dedicated to complex and advanced labs to emphasize the learning objectives.
The course is 100% compliance with NICE 2.0 framework and CREST CCTIM.
What You'll Learn
• You will learn the various cyber security threats and attack frameworks (advanced persistent threats, cyber kill chain methodology, MITRE ATT&CK framework, diamond model of intrusion analysis, etc.).
• You will learn the various steps involved in planning a threat intelligence program (requirements, planning, direction, and review).
• You will learn about the different types of threat intelligence feeds, sources, data collection methods.
• You will learn about threat intelligence data collection and acquisition through opensource intelligence (OSINT), human intelligence (HUMINT), cyber counterintelligence (CCI), indicators of compromise (IoCs), malware analysis, and Python scripting.
• You will learn about threat intelligence data processing and exploitation.
• You will learn about threat data analysis techniques (statistical data analysis, analysis of competing hypotheses (ACH), structured analysis of competing hypotheses (SACH), etc.).
• You will learn about the complete threat analysis process, which includes threat modeling, fine tuning, evaluation, and runbook and knowledge base creation.
• You will learn how to create and share threat intelligence reports.
• You will learn about threat intelligence sharing and collaboration using Python scripting.
• You will learn the different platforms, acts, and regulations for sharing intelligence.
• You will learn how to perform threat intelligence in a cloud environment.
• You will learn the fundamentals of threat hunting (threat hunting types, process, loop, methodology, etc.).
• You will learn about threat hunting automation using Python scripting.
• You will learn about threat intelligence in SOC operations, incident response, and risk management.
Entry Requirements
Mid-level to high-level cybersecurity professionals with a minimum of 3 years of experience OR Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence.