top of page

Related Courses

Cyber Security Threat Intelligence Research (CTIR) Online Course

Price: 4.00 USD | Size:2.25 GB | Duration : 4.21 Hours | 27 Lessons | 

BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD  

 

Cyber Security Threat Intelligence Research (CTIR) Online  Course

 

 

Do you possess an analytical mind? Is critical thinking a part of who you are? Then you’ve come to the right place. A Certified Threat Intelligence Analyst (CTIA) acts as a force multiplier for organizations looking to reinforce their cyber defense security measures. Threat intelligence is akin to what conventional intelligence agencies across the world engage in to perceive and neutralize threats before any harm can be done. As a certified threat intelligence analyst, you’ll be at the vanguard of your organization’s cybersecurity ecosystem, keeping a 360 degree vigil on existing and foreseen/unforeseen threats.

 

 

The Certified Threat Intelligence Analyst (CTIA) program is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe. The aim is to help organizations hire qualified cyber intelligence trained professionals to identify and mitigate business risks by converting unknown internal and external threats into quantifiable threat entities and stop them in their tracks. Much like a ‘hunter-killer’ team, you’ll be deployed as a ‘Blue Team’ operative, tasked with threat identification, and asked to employ the tools at hand to thwart active and potential cyberattacks.

 

 

Why Become a Certified Threat Intelligence Analyst?

 

  • Compliant with JTA listed under the ‘Analyze’ category of NICE 2.0

Our cyber threat intelligence training program employs a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. This makes it the ideal threat intelligence course for professionals to excel in the cybersecurity domain.

 

  • Increased employability, geometrically

The cyber threat intelligence training empowers you with the latest techniques and tools to detect, engage, and neutralize cyberattacks in real time. This puts you in a unique place where recruiters are just waiting to grab skilled professionals, like you!

 

  • Developed by global subject matter experts (SMEs)

cyber intelligence analyst certification is developed using inputs and a vast pool of talent from global subject matter experts. A comprehensive cyber intelligence course, covering the A to Z of threat intelligence.

 

Learning Objectives of C|TIA Program

 

  • Key issues in the InfoSec domain.
  • Importance of threat intelligence in risk management, SIEM, and incident response.
  • Various cyber threats, threat actors, and their objectives for cyberattacks.
  • Fundamentals of threat intelligence (including threat intelligence types, life cycle, strategy, capabilities, maturity model, frameworks, etc.)
  • Cyber kill chain methodology, Advanced Persistent Threat (APT), Indicators of Compromise (IoCs), and the pyramid of pain.
  • Threat intelligence program steps (Requirements, Planning, Direction, Review).
  • Types of data feeds, sources, and data collection methods.
  • Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), and malware analysis.
  • Bulk data collection and management (data processing, structuring, normalization, sampling, storing, and visualization).
  • Data analysis types and techniques including Statistical Data Analysis, Structured Analysis of Competing Hypotheses (SACH), etc.
  • Complete threat analysis process including threat modeling, fine-tuning, evaluation, runbook, and knowledge base creation.
  • Different data analysis, threat modeling, and threat intelligence tools.
  • Creating effective threat intelligence reports.
  • Different threat intelligence sharing platforms, acts, and regulations for sharing strategic, tactical, operational, and technical intelligence.

Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract intelligence from data by implementing various advanced strategies. Such professional-level threat intelligence training programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.

CTIA is a method-driven threat intelligence program that uses a 360-degree approach, covering concepts from planning to building a threat intelligence report for pre-emptive threat detection and preventive measures. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.

 

Video Lessons in this course

 

1 - Phases Overview‬

 

01 Phases Overview

02 Hunting and Features Extraction

03 Behavior Extraction

04 Clustering and Correlation & Threat Actor Attribution

05 Tracking and Taking Down

 

‪2 - Hunting‬

 

06 VirusTotal

07 Lab-VirusTotal Intelligence

08 Hacking Forums

09 DeepWeb

10 Honeypot and OSINT

 

‪3 - Features Extraction‬

 

11 Intro

12 Import Table Hash (imphash)

13 Strings

14 Lab 1-Extracting VBA Macros with Didier Stevens Tools

15 Lab 2-C2 IP Pivoting

 

 

‪4 - Behavior Extraction‬

 

16 Dynamic Indicators

17 Process Infector, Keylogger & Passive DNS

 

‪5 - Clustering and Correlation‬

18 How Clustering & Correlation Work

19 GraphDB

 

‪6 - Tracking‬

 

  Size Last Modified

20 Passive DNS & Internet Port Scan

21 Lookups, OSINT & Hacking Forums

 

‪7 - Taking Down‬

 

22 Sinkhole

23 Hacking Forums & Victim Notification

 

‪8 - Attribution‬

 

24 Who Are The Targets and Where Are They Located_

25 Tactics, Techniques & Procedures-Part 01

26 Tactics, Techniques & Procedures-Part 02

27 Profiling the Attacker

Cyber Security Threat Intelligence Research (CTIR) Online Course

SKU: EXT2021-0268
$4.00Price
    bottom of page