EC-Council Certified Threat Intelligence Analyst (CTIA)
1 – Introduction to Threat Intelligence
– Understanding Intelligence
– Understanding Cyber Threat Intelligence
– Overview of Threat Intelligence Lifecycle and Frameworks
2 – Cyber Threats and Kill Chain Methodology
– Understanding Cyber Threats
– Understanding Advanced Persistent Threats (APTs)
– Understanding Cyber Kill Chain
– Understanding Indicators of Compromise (IoCs)
3 – Requirements, Planning, Direction, and Review
– Understanding Organization’s Current Threat Landscape
– Requirements Analysis
– Planning Threat Intelligence Program
– Establishing Management Support
– Building a Threat Intelligence Team
– Overview of Threat Intelligence Sharing
– Reviewing Threat Intelligence Program
4 – Data Collection and Processing
– Overview of Threat Intelligence Data Collection
– Overview of Threat Intelligence Collection Management
– Overview of Threat Intelligence Feeds and Sources
– Understanding Threat Intelligence Data Collection and Acquisition
– Bulk Data Collection
– Data Processing and Exploitation
5 – Data Analysis
– Overview of Data Analysis
– Data Analysis Techniques
– Overview of Threat Analysis
– Threat Analysis Process
– Fine-Tuning Threat Analysis
– Threat Intelligence Evaluation
– Creating Runbooks and Knowledge Base
– Overview of Threat Intelligence Tools
6 – Intelligence Reporting and Dissemination
– Overview of Threat Intelligence Reports
– Introduction to Dissemination
– Participating in Sharing Relationships
– Overview of Sharing Threat Intelligence
– Delivery Mechanisms
– Understanding Threat Intelligence Sharing Platforms
– Overview of Intelligence Sharing Acts and Regulations