Program Highlights
Certified Threat Intelligence Analyst (CTIA) from EC-Council is a credentialing certification and training program. This highly valued certification has been exclusively devised in collaboration with threat intelligence and cybersecurity experts worldwide to empower organizations effectively to identify and mitigate security risks with extensive processing and analysis of available threat information. The CTIA is a specialist level training and certification that demonstrates security professionals the structured approach to acquiring threat intelligence. The CTIA certified candidates attain a competitive edge over other information security professionals. This threat intelligence certification course delivers standards-based, intensive practical skills to the most essentially required threat intelligence across information security.
24-Hour LIVE Instructor-led Training
Hands-on Labs
Covers All 8 CTIA Domains
EC-Council Authorized Partner
Immersive Learning
Certified Experts
Career Guidance & Mentorship
Post Training Support
Access to Recorded Sessions
Training Schedule
- upcoming classes
- corporate training
- 1 on 1 training
Looking for a customized training?
REQUEST A BATCHWhy Choose Our Corporate Training Solution
- Upskill your team on the latest tech
- Highly customized solutions
- Free Training Needs Analysis
- Skill-specific training delivery
- Secure your organizations inside-out
Why Choose 1-on-1 Training
- Get personalized attention
- Customized content
- Learn at your dedicated hour
- Instant clarification of doubt
- Guaranteed to run
Can't Find a Suitable Schedule? Talk to Our Training Advisor!
Certified Threat Intelligence Analyst (CTIA) from EC-Council is a credentialing certification and training program. This highly valued certification has been exclusively devised in collaboration with threat intelligence and cybersecurity experts worldwide to empower organizations effectively to identify and mitigate security risks with extensive processing and analysis of available threat information. The CTIA is a specialist level training and certification that demonstrates security professionals the structured approach to acquiring threat intelligence. The CTIA certified candidates attain a competitive edge over other information security professionals. This threat intelligence certification course delivers standards-based, intensive practical skills to the most essentially required threat intelligence across information security.
Module 1: Introduction to Threat Intelligence
- Intelligence
- Cyber Threat Intelligence Concepts
- Threat Intelligence Lifecycle and Frameworks
- Threat Intelligence Platforms (TIPs)
- Threat Intelligence in the Cloud Environment
- Future Trends and Continuous Learning
Module 2: Cyber Threats and Attack Frameworks
- Cyber Threats
- Advanced Persistent Threats
- Cyber Kill Chain
- MITRE ATT&CK and Diamond Model
- Indicators of Compromise
Module 3: Requirements, Planning, Direction, and Review
- Organization’s Current Threat Landscape
- Requirements Analysis
- Plan a Threat Intelligence Program
- Establish Management Support
- Build a Threat Intelligence Team
- Threat Intelligence Sharing
- Review Threat Intelligence Program
Module 4: Data Collection and Processing
- Threat Intelligence Data Collection
- Threat Intelligence Collection Management
- Threat Intelligence Feeds and Sources
- Threat Intelligence Data Collection and Acquisition
- Bulk Data Collection
- Data Processing and Exploitation
- Threat Data Collection and Enrichment in Cloud Environments
LABS (Module 4):
- Data Collection through Search Engines, Web Services, Website Footprinting, Email Footprinting, DNS Interrogation, Automated OSINT Tools, Social Engineering Techniques, Cyber Counterintelligence (CCI) Techniques, Malware Analysis, and Python Scripting
- IoC Data Collection through External Sources and Internal Sources
- Structuring/Normalization of Collected Data
Module 5: Data Analysis
- Data Analysis
- Data Analysis Techniques
- Threat Analysis
- Threat Analysis Process
- Fine-Tuning Threat Analysis
- Threat Intelligence Evaluation
- Create Runbooks and Knowledge Base
- Threat Intelligence Tools
LABS (Module 5):
- Perform Threat Modeling and Data Analysis
- Perform Complete Threat Intelligence using Threat Intelligence Tools
Module 6: Intelligence Reporting and Dissemination
- Threat Intelligence Reports
- Dissemination
- Participate in Sharing Relationships
- Sharing Threat Intelligence
- Delivery Mechanisms
- Threat Intelligence Sharing Platforms
- Intelligence Sharing Acts and Regulations
- Threat Intelligence Integration
- Threat Intelligence Sharing and Collaboration using Python Scripting
LABS (Module 6):
- Perform Threat Intelligence Reporting and Sharing
Module 7: Threat Hunting and Detection
- Threat Hunting Concepts
- Threat Hunting Automation
LABS (Module 7):
- Perform Targeted Threat Hunting using Python Scripts
- Perform Threat Hunting Automation using Threat Intelligence Tools
Module 8: Threat Intelligence in SOC Operations, Incident Response, and Risk Management
- Threat Intelligence in SOC Operations
- Threat Intelligence in Risk Management
- Threat Intelligence in Incident Response
LABS (Module 8):
- Perform Cyber Threat Intelligence using the SOC Threat Intelligence Platforms
This training is ideal for:
- Security professionals and ethical hackers
- Security analysts and architects
- SOC professionals, cybersecurity forensic experts and malware analysts
- Security consultants and threat hunters
- Working experience of minimum 2 years in information security
| Exam Code | 312-38 |
| Certification Name | Certified Threat Intelligence Analyst |
| Exam Duration | 2 Hours |
| Number of Questions | 50 |
| Exam Format | Multiple Choice |
| Availability | EC-Council Exam Portal |
Upon successful completion of the training, participants will be able to:
- Gain skills for performing diverse types of threat intelligence
- Learn various data collection techniques from multiple sources and feeds
- Learn how to collect, create, and disseminate Indicators of Compromise (IoCs) in various formats
- Gain proficiency in developing a structured approach for performing threat analysis and threat intelligence evaluation
- Learn various techniques for threat intelligence reporting and dissemination
- Know the latest threat intelligence tools/platforms and frameworks
- Know how to perform threat intelligence through Python Scripting
- Gain skills in threat hunting and detection
- Learn threat intelligence in SOC Operations, Incident Response, and Risk Management
- Enhance your threat intelligence skills in the cloud environment
- Based on a comprehensive industry-wide job task analysis (JTA)
How We Help You Succeed
Vision
Goal
Skill-Building
Mentoring
Direction
Support
Success
Our Expert Course Advisors
10+ Years of Experience
Words Have Power
It was a very good experience with the team. The class was clear and understandable, and it benefited me in learning all the concepts and gaining valuable knowledge.
I loved the overall training! Trainer is very knowledgeable, had clear understanding of all the topics covered. Loved the way he pays attention to details.
I had a great experience with the team. The training advisor was very supportive, and the trainer explained the concepts clearly and effectively. The program was well-structured and has definitely enhanced my skills in AI. Thank you for a wonderful learning experience.
The class was really good. The instructor gave us confidence and delivered the content in an impactful and easy-to-understand manner.
The program helped me understand several areas I was unfamiliar with. The instructor was exceptionally skilled and confident in delivering content.
The program was well-structured and easy to follow. The instructor’s use of real-life AI examples made it easier to connect with and understand the concepts.
Success Speaks Volumes
Get a Sample Certificate