Health, Safety & Security

Training Course: Certified Threat Intelligence Analyst (CTIA)


Register Now
Quick Inquiry
Discount Group Download Brochure (38)

HE234655

26 - 30 May 2025

Madrid (Spain)

Hotel : Pestana CR7 Gran Vía

Cost : 5775 € Euro

Introduction

Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialist-level program that teaches a structured approach for building effective threat intelligence.

The program was based on a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. This program differentiates threat intelligence professionals from other information security professionals. It is a highly interactive, comprehensive, standards-based, intensive 5-day training program that teaches information security professionals to build professional threat intelligence.

More than 40 percent of class time is dedicated to the learning of practical skills, and this is achieved. Theory to practice ratio for C|TIA program is 60:40, providing students with a hands-on experience of the latest threat intelligence tools, techniques, methodologies, frameworks, scripts, etc. C|TIA comes integrated with labs to emphasize the learning objectives.

The C|TIA lab environment consists of the latest operating systems including Windows 10 and Kali Linux for planning, collecting, analyzing, evaluating, and disseminating threat intelligence.

Course Objectives of Certified Threat Intelligence Analyst (CTIA)

After completing this course you should be able to understand:

  • Key issues plaguing the information security world
  • Importance of threat intelligence in risk management, SIEM, and incident response
  • Types of cyber threats, threat actors and their motives, goals, and objectives of cybersecurity attacks
  • Fundamentals of threat intelligence (including threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, etc.)
  • Cyber kill chain methodology, Advanced Persistent Threat (APT) lifecycle, Tactics, Techniques, and Procedures (TTP), Indicators of Compromise (IoCs), and pyramid of pain
  • Various steps involved in planning a threat intelligence program (Requirements, Planning, Direction, and Review)
  • Different types of data feed, sources, and data collection methods
  • Threat intelligence data collection and acquisition through Open Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), and malware analysis
  • Bulk data collection and management (data processing, structuring, normalization, sampling, storing, and visualization)
  • Different data analysis types and techniques including statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)
  • Complete threat analysis process which includes threat modeling, fine-tuning, evaluation, runbook, and knowledge base creation
  • Different data analysis, threat modeling, and threat intelligence tools
  • Threat intelligence dissemination and sharing protocol including dissemination preferences, intelligence collaboration, sharing rules and models, TI exchange types and architectures, participating in sharing relationships, standards, and formats for sharing threat intelligence
  • Effective creation of threat intelligence reports
  • Different threat intelligence sharing platforms acts, and regulations for sharing strategic, tactical, operational, and technical intelligence

Target Audience of Certified Threat Intelligence Analyst (CTIA)

Any cybersecurity professional who needs to understand how to gather large amounts of relevant threat information from a multitude of intelligence sources can then be analyzed to provide threat intelligence that accurately predicts the potential threats that an organization may encounter. These individuals may be fulfilling roles such as Ethical Hackers, Threat Intelligence Analysts, Threat Hunters, SOC Professionals, Digital Forensic and Malware Analysts, Incident Response,

Course Outlines of Certified Threat Intelligence Analyst (CTIA)

Day 1

Introduction to Threat Intelligence

  • Understanding Intelligence
  • Understanding Cyber Threat Intelligence
  • Overview of Threat Intelligence Lifecycle and Frameworks

Cyber Threats and Kill Chain Methodology

  • Understanding Cyber Threats
  • Understanding Advanced Persistent Threats (APTs)
  • Understanding Cyber Kill Chain
  • Understanding Indicators of Compromise (IoCs)

Day 2

Requirements, Planning, Direction, and Review

  • Understanding Organization’s Current Threat Landscape
  • Understanding Requirements Analysis
  • Planning Threat Intelligence Program
  • Establishing Management Support
  • Building a Threat Intelligence Team
  • Overview of Threat Intelligence Sharing
  • Reviewing Threat Intelligence Program

Day 3

Data Collection and Processing

  • Overview of Threat Intelligence Data Collection
  • Overview of Threat Intelligence Collection Management
  • Overview of Threat Intelligence Feeds and Sources
  • Understanding Threat Intelligence Data Collection and Acquisition
  • Understanding Bulk Data Collection
  • Understanding Data Processing and Exploitation

Day 4

Data Analysis

  • Overview of Data Analysis
  • Understanding Data Analysis Techniques
  • Overview of Threat Analysis
  • Understanding Threat Analysis Process
  • Overview of Fine-Tuning Threat Analysis
  • Understanding Threat Intelligence Evaluation
  • Creating Runbooks and Knowledge Base
  • Overview of Threat Intelligence Tools

Day 5

Intelligence Reporting and Dissemination

  • Overview of Threat Intelligence Reports
  • Introduction to Dissemination
  • Participating in Sharing Relationships
  • Overview of Sharing Threat Intelligence
  • Overview of Delivery Mechanisms
  • Understanding Threat Intelligence Sharing Platforms
  • Overview of Intelligence Sharing Acts and Regulations
  • Overview of Threat Intelligence Integration

Health, Safety & Security

Training Course: Certified Threat Intelligence Analyst (CTIA)


Register Now
Quick Inquiry
Discount Group Download Brochure (38)

HE234655

26 - 30 May 2025

Madrid (Spain) - Pestana CR7 Gran Vía

Hotel : Pestana CR7 Gran Vía

Cost: 5775 € Euro


  About Madrid

Madrid is a city that combines its enduring history with its cosmopolitan atmosphere to create a destination that favored amongst tourists from around the world. This is a city that is very much bursting at the seams with life and its vibrant atmosphere, cultural attractions and connection with history ensure travelers have everything they could possibly want from a European city break. At the end of a flight to Madrid, there are sites to see, picturesque streets to roam and, of course, excellent shopping opportunities to explore. Visitors can immerse themselves in Madrid's fantastic local culture, its peerless art scene and world acclaimed fine dining. In fact, there is very little that Madrid doesn't have to offer.


  Things to do and places to visit in Madrid

The only problem travelers will encounter during their visit to Madrid is knowing what to do first. Sampling the mouth-watering tapas, strolling through one of the many excellent museums or even simply soaking up the atmosphere are all excellent options. Spend a sunny day wandering through the splendid squares or marvel at the intricate architecture of the churches.With so many options, flights to Madrid are great for people of any age or inclination.

When visiting Madrid, be sure to:

  • See the superb collection of art is the Museo del Prado.
  • Stroll down the Gran Via.
  • Enjoy the atmosphere of the Plaza Mayor.
  • Wander through the stunning gardens of the Parque del Buen Retiro.
  • See the beautiful mansion of the Museo Lazaro Galdiano.
  • Find quirky fashions in the Fuencarral market.
  • Try some of the many different tapas dishes.
  • Visit the statues of Don Quixote and Sancho Panza in the Plaza de Espana.
  • See the breathtaking Basilica de San Francisco El Grande.
  • Wander the Casa de Campo park, which is five times the size of Central Park.
  • Shop in the luxury boutiques of the Golden Mile.
  • Look for bargains at the El Rasto flea market.
  • See Picasso's Guernica in the Reina Sofia museum.
  • Snack on churros with chocolate.
 22 Portman Square, Marylebone, London W1H 7BG, UK
 3 Oudai street, Aldouki, Giza, Giza Governorate, Egypt
 0020233379764
 00201095004484
 00201102960555
 00201102960666
 19 Mayıs Mahallesi, 19 Mayis Street No 2 Sisli, 34360 Istanbul/Turkey
 00905357839460
 Australia Street, Raouche Beirut, Lebanon .، Beirut, Lebanon
 0096181746278
 811 Massachusetts Avenue, Boston, Massachusetts, 02118, USA
 6 Beirut Street - Fifth Circle Abdoun, P.O. Box 831370, 11183 Amman, Jordan
Copyright Global Horizon Training Center © 2019