CTIA - Certified Threat Intelligence Analyst

CTIA - Certified Threat Intelligence Analyst

CTIA - Certified Threat Intelligence Analyst


Duration: 3.0 days

Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing programdesigned and developed in collaboration withcybersecurity and threat intelligence expertsacross the globe to help organizations identifyand mitigate business risks by convertingunknown internal and external threats intoknown threats. 

It is a comprehensive specialistlevel program that teaches a structuredapproach for building effective threatintelligence.The program was based on a rigorous JobTask Analysis (JTA) of the job roles involved inthe field of threat intelligence. This programdifferentiates threat intelligence professionalsfrom other information security professionals.It is a highly interactive, comprehensive,standards-based, intensive 3-day trainingprogram that teaches information securityprofessionals to build professional threatintelligence. 


Key issues in the InfoSec domain.

Importance of threat intelligence in risk management, SIEM, and incident response.


Various cyber threats, threat actors, and their objectives for cyberattacks.

Fundamentals of threat intelligence (including threat intelligence types, life cycle, strategy, capabilities, maturity model, frameworks, etc.)


Cyber kill chain methodology, Advanced Persistent Threat (APT), Indicators of Compromise (IoCs), and the pyramid of pain.

Threat intelligence program steps (Requirements, Planning, Direction, Review).


Types of data feeds, sources, and data collection methods.

Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), and malware analysis.


Bulk data collection and management (data processing, structuring, normalization, sampling, storing, and visualization).

Data analysis types and techniques including Statistical Data Analysis, Structured Analysis of Competing Hypotheses (SACH), etc.


Complete threat analysis process including threat modeling, fine-tuning, evaluation, runbook, and knowledge base creation.

Different data analysis, threat modeling, and threat intelligence tools.


Creating effective threat intelligence reports.

Different threat intelligence sharing platforms, acts, and regulations for sharing strategic, tactical, operational, and technical intelligence.


  • Introduction to Threat Intelligence
  • Cyber Threats and Kill Chain Methodology
  • Requirements, Planning, Direction, and Review
  • Data Collection and Processing
  • Data Analysis
  • Intelligence Reporting and Dissemination


Who Is It For?

  • Ethical Hackers
  • Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers
  • Threat Intelligence Analysts, Associates, Researchers, Consultants
  • Threat Hunters
  • SOC Professionals
  • Digital Forensic and Malware Analysts
  • Incident Response Team Members
  • Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience.
  • Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence.
  • Individuals interested in preventing cyber threats.


- Network 
- Security Basic


About the Exam

C|TIA allows cybersecurity professionals to demonstrate their mastery of the knowledge and skills required for threat intelligence

Number of Questions: 50
Duration: 2 hours
Availability: EC-Council Exam Portal
Test Format: Multiple Choice
Passing Score: 70%

Eligibility Criteria
To be eligible to challenge the C|TIA Exam, the candidate must either:

  • Attend official EC-Council C|TIA training through an accredited EC-Council Partner (Accredited Training Center, iWeek, or iLearn) (All candidates are required to pay the USD100 application fee unless your training fee already includes this) or
  • Submit an application showing a minimum of 2 years working experience in information security (All candidates are required to pay USD 100 as a non-refundable application fee)

Lịch khai giảng

Form đăng ký

Bằng cách nhấn nút "ĐĂNG KÝ", tôi hoàn toàn đồng ý với Chính sách bảo mật

Các khóa đào tạo EC-Council khác

CHFI - Computer Hacking Forensic Investigator

Digital forensic practices stem from forensic science, the science of collecting and examining evidence or materials. Digital or computer forensics focuses on the digital domain including computer forensics, network forensics, and mobile forensics. As the cyber security profession evolves, organizations are learning the importance of employing digital forensic practices into their everyday activities. Computer forensic practices can help investigate attacks, system anomalies, or even help System administrators detect a problem by defining what is normal functional specifications and validating system information for irregular behaviors. In the event of a cyber-attack or incident, it is critical investigations be carried out in a manner that is forensically sound to preserve evidence in the event of a breach of the law. Far too many cyber-attacks are occurring across the globe where laws are clearly broken and due to improper or non-existent forensic investigations, the cyber criminals go either unidentified, undetected, or are simply not prosecuted. Cyber Security professionals who acquire a firm grasp on the principles of digital forensics can become invaluable members of Incident Handling and Incident response teams. The Computer Hacking Forensic Investigator course provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. CHFI provides its attendees a firm grasp on the domains of digital forensics.
5.0 ngày

Bản quyền thuộc về Trainocate Việt Nam

back to top