Health, Safety & Security

Training Course: Certified Threat Intelligence Analyst (CTIA)


Register Now
Quick Inquiry
Discount Group Download Brochure (40)

HE234655

6 - 10 Apr 2025

Cairo (Egypt)

Hotel : Holiday Inn & Suites Cairo Maadi, an IHG Hotel

Cost : 3575 € Euro

Introduction

Certified Threat Intelligence Analyst (C|TIA) is a globally recognized program designed to help organizations mitigate risks by converting unknown threats into actionable intelligence. It offers a structured, specialist-level training built on rigorous Job Task Analysis (JTA). The 5-day program emphasizes hands-on learning with a 60:40 theory-to-practice ratio. Integrated labs use environments like Windows 10 and Kali Linux to teach practical threat intelligence skills. C|TIA equips professionals with cutting-edge tools, methodologies, and frameworks to excel in the field.

Course Objectives

  • Key issues plaguing the information security world

  • Importance of threat intelligence in risk management, SIEM, and incident response

  • Types of cyber threats, threat actors and their motives, goals, and objectives of cybersecurity attacks

  • Fundamentals of threat intelligence (including threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, etc.)

  • Cyber kill chain methodology, Advanced Persistent Threat (APT) lifecycle, Tactics, Techniques, and Procedures (TTP), Indicators of Compromise (IoCs), and pyramid of pain

  • Various steps involved in planning a threat intelligence program (Requirements, Planning, Direction, and Review)

  • Different types of data feed, sources, and data collection methods

  • Threat intelligence data collection and acquisition through Open Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), and malware analysis

  • Bulk data collection and management (data processing, structuring, normalization, sampling, storing, and visualization)

  • Different data analysis types and techniques including statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)

  • Complete threat analysis process which includes threat modeling, fine-tuning, evaluation, runbook, and knowledge base creation

  • Different data analysis, threat modeling, and threat intelligence tools

  • Threat intelligence dissemination and sharing protocol including dissemination preferences, intelligence collaboration, sharing rules and models, TI exchange types and architectures, participating in sharing relationships, standards, and formats for sharing threat intelligence

  • Effective creation of threat intelligence reports

  • Different threat intelligence sharing platforms acts, and regulations for sharing strategic, tactical, operational, and technical intelligence

Target Audience

  • Ethical Hackers

  • Threat Intelligence Analysts

  • Threat Hunters

  • SOC Professionals

  • Digital Forensic Analysts

  • Malware Analysts

  • Incident Response Professionals

Outlines

Day 1

Introduction to Threat Intelligence

  • Understanding Intelligence

  • Understanding Cyber Threat Intelligence

  • Overview of Threat Intelligence Lifecycle and Frameworks

Cyber Threats and Kill Chain Methodology

  • Understanding Cyber Threats

  • Understanding Advanced Persistent Threats (APTs)

  • Understanding Cyber Kill Chain

  • Understanding Indicators of Compromise (IoCs)

Day 2

Requirements, Planning, Direction, and Review

  • Understanding Organization’s Current Threat Landscape

  • Understanding Requirements Analysis

  • Planning Threat Intelligence Program

  • Establishing Management Support

  • Building a Threat Intelligence Team

  • Overview of Threat Intelligence Sharing

  • Reviewing Threat Intelligence Program

Day 3

Data Collection and Processing

  • Overview of Threat Intelligence Data Collection

  • Overview of Threat Intelligence Collection Management

  • Overview of Threat Intelligence Feeds and Sources

  • Understanding Threat Intelligence Data Collection and Acquisition

  • Understanding Bulk Data Collection

  • Understanding Data Processing and Exploitation

Day 4

Data Analysis

  • Overview of Data Analysis

  • Understanding Data Analysis Techniques

  • Overview of Threat Analysis

  • Understanding Threat Analysis Process

  • Overview of Fine-Tuning Threat Analysis

  • Understanding Threat Intelligence Evaluation

  • Creating Runbooks and Knowledge Base

  • Overview of Threat Intelligence Tools

Day 5

Intelligence Reporting and Dissemination

  • Overview of Threat Intelligence Reports

  • Introduction to Dissemination

  • Participating in Sharing Relationships

  • Overview of Sharing Threat Intelligence

  • Overview of Delivery Mechanisms

  • Understanding Threat Intelligence Sharing Platforms

  • Overview of Intelligence Sharing Acts and Regulations

  • Overview of Threat Intelligence Integration

Health, Safety & Security

Training Course: Certified Threat Intelligence Analyst (CTIA)


Register Now
Quick Inquiry
Discount Group Download Brochure (40)

HE234655

6 - 10 Apr 2025

Cairo (Egypt) - Holiday Inn & Suites Cairo Maadi, an IHG Hotel

Hotel : Holiday Inn & Suites Cairo Maadi, an IHG Hotel

Cost: 3575 € Euro


  About Cairo

Cairo is a mesmerizing assortment of iconic monuments, bustling markets, and ancient sites encircled by a vast and sprawling metropolis. At its core lies a maze-like medieval quarter. A world away from the modern side of the city, it boasts a seductive blend of intricate mosques, jostling crowds, madrasas, and traditional hammams. No visit could be complete without visiting the awe-inspiring Giza Pyramids that preside over the city's horizon. Whether you come to delve into the city's ancient past, dive into colorful souqs, sip mint tea and contemplate thousands of years of history or explore the city's cosmopolitan side, you'll be left with memories to last a lifetime.


  Things to do and places to visit in Cairo

The multi-layered capital of Egypt offers its visitors lively markets, authentic restaurants, and a multitude of ancient sights and archeological findings. Gaze in wonder at the Pyramids, take an awe-inspiring look at Tutankhamen's burial mask, shop for handmade souvenirs in the bazaars or hop on a sunset cruise down the Nile and embrace the sensory overload that is Cairo.

Take a vacation in Cairo and you can:

  • Visit the Great Sphinx of Giza, one of Ancient Egypt's great mysteries.
  • Explore the ramparts of the Salah El-Din Citadel.
  • Join locals drinking coffee at Fishawi Café, one of Cairo's first cafes and most important meeting spots.
  • Marvel at the seemingly endless historical artifacts on display at the Egyptian Museum.
  • Learn about the Ummayad, Ottoman, and Ayyubbid dynasties and more at the Museum of Islamic Art.
  • Haggle for souvenirs and gifts at the Khan el-Khalili souk.
  • See one of the world's oldest universities at the Al-Azhar Mosque, one of the city's original mosques.
  • Take a tour of the showstopping Giza pyramids.
  • Savor local cuisine such as mezze in the old city.
  • Wander through the labyrinth-like streets of Coptic Cairo, the city's ancient quarter, and spot Roman relics.
 22 Portman Square, Marylebone, London W1H 7BG, UK
 3 Oudai street, Aldouki, Giza, Giza Governorate, Egypt
 0020233379764
 00201095004484
 00201102960555
 00201102960666
 19 Mayıs Mahallesi, 19 Mayis Street No 2 Sisli, 34360 Istanbul/Turkey
 00905357839460
 Australia Street, Raouche Beirut, Lebanon .، Beirut, Lebanon
 0096181746278
 811 Massachusetts Avenue, Boston, Massachusetts, 02118, USA
 6 Beirut Street - Fifth Circle Abdoun, P.O. Box 831370, 11183 Amman, Jordan
Copyright Global Horizon Training Center © 2019