Exclusives

  • Certification exam participation: Voucher included – value of $350!
  • Video recording: 365 days of access to your course for viewing
  • Technical lab: Available for 180 days of online access
  • Class material: Complete and up to date with ASPEN
  • CodeRed: Subscription to the platform included for 365 days
  • Proof of attendance: Digital certificate of completion for the official EC-Council course
  • Fast and guaranteed schedule: Maximum wait of 4 to 6 weeks after participant registrations, guaranteed date

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts from around the world to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialist-level program that teaches a structured approach to creating effective threat intelligence.

In the constantly evolving threat landscape, C|TIA is an essential program for those who face cyber threats daily. Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the programs aligns with and adheres to threat intelligence frameworks published by government and industry.

Expand

Private class

Inquire for this training to be delivered exclusively for the members of your organization.

Training plan

  • Understand Intelligence
  • Summarize Cyber Threat Intelligence Concept
  • Explain Threat Intelligence Lifecycle and Frameworks
  • Understand Threat Intelligence Platforms (TIPs)
  • Understand Threat Intelligence in the Cloud Environment
  • Understand Future Trends and Continuous Learning
  • Understand Cyber Threat
  • Explain Advanced Persistent Threats
  • Explain Cyber Kill Chain
  • Explain MITRE ATT&CK and Diamond Model
  • Understand Indicators of Compromise
  • Understand the Organization’s Current Threat Landscape
  • Understand Requirements Analysis
  • Plan a Threat Intelligence Program
  • Establish Management Support
  • Build a Threat Intelligence Team
  • Understand Threat Intelligence Sharing
  • Review Threat Intelligence Program
  • Understand Threat Intelligence Data Collection
  • Summarize Threat Intelligence Collection Management
  • Explain Threat Intelligence Feeds and Sources
  • Explain Threat Intelligence Data Collection and Acquisition
  • Understand Bulk Data Collection
  • Explain Data Processing and Exploitation
  • Understand Threat Data Collection and Enrichment in Cloud Environments
  • Summarize Data Analysis
  • Explain Data Analysis Techniques
  • Understand Threat Analysis
  • Demonstrate Threat Analysis Process
  • Explain Fine-tuning Threat Analysis
  • Understand Threat Intelligence Evaluation
  • Create Runbooks and Knowledge Base
  • Use Threat Intelligence Tools
  • Understand Threat Intelligence Reports
  • Understand Dissemination
  • Participate in Sharing Relationships
  • Understand Sharing Threat Intelligence
  • Explain Delivery Mechanisms
  • Use Threat Intelligence Sharing Platform
  • Understand Intelligence Sharing Acts and Regulations
  • Explain Threat Intelligence Integration
  • Understand Intelligence Sharing and Collaboration using Python Scripting
  • Summarize Threat Hunting Concepts
  • Understand Threat Hunting Automation

  • Understand Threat Intelligence in SOC Operations
  • Understand Threat Intelligence in Risk Management
  • Understand Threat Intelligence in Incident Response
  • Understand Threat Intelligence in SOC Operations
  • Understand Threat Intelligence in Risk Management
  • Understand Threat Intelligence in Incident Response

Recommended Prerequisite Knowledge

  • Understanding of Network and Security Concepts: A good grasp of basic networking and security principles.
  • Knowledge of TCP/IP Protocols: Familiarity with TCP/IP protocols and the OSI model.
  • Experience with Network Security Devices: Exposure to network security devices such as firewalls, IDS, and IPS.
  • Practical Experience in Cybersecurity: Hands-on experience in cybersecurity operations, such as working in a Security Operations Center (SOC) or a related field.
  • Familiarity with Threat Intelligence: Basic understanding of threat intelligence concepts and tools.

Credentials and certification

Exam features

  • Code: 312-85
  • Title: Certified Threat Intelligence Analyst
  • Duration: 2 hours  
  • Number of Questions: 50 
  • Question Format: Multiple Choice
  • Online with EC-Council Exam Center
  • Cost: $0 (included in your training)

All details >> 

Request form for a private class training

Dear Client,

We confirm the receipt of your request regarding the training: Certified Threat Intelligence Analyst (CTIAv2) (EC6165)

Here is the information we have received.

Language: English

Duration: 3 days / 21 hours

Number of participants from your company: *

Minimum number of participants: 6

Name of your organization *
Your name and surname: *
Phone Number: *
Professional email: *
How did you hear about us? *
Comments or Remarks:
Promotional code:
I accept the General Terms and Conditions
The General Conditions are accessible on this page.

Our website uses cookies to personalize your browsing experience. By clicking ‘I accept,’ you consent to the use of cookies.