Certified Threat Intelligence Analyst
Certified Threat Intelligence Analyst
Certified Threat Intelligence Analyst

Certified Threat Intelligence Analyst

Identify and mitigate business risks by converting unknown internal and external threats into quantifiable threat entities and stop them in their tracks.

Ideal For

Certified Threat Intelligence Analyst requires a minimum of 2 years of experience and is suitable for mid-level to high-level cybersecurity professionals. It is also for information security professionals who want to enrich their skills and knowledge in the field of cyber threat intelligence.

Certified Threat Intelligence Analyst requires a minimum of 2 years of experience and is suitable for mid-level to high-level cybersecurity professionals. It is also for information security professionals who want to enrich their skills and knowledge in the field of cyber threat intelligence.

Certified Threat Intelligence Analyst requires a minimum of 2 years of experience and is suitable for mid-level to high-level cybersecurity professionals. It is also for information security professionals who want to enrich their skills and knowledge in the field of cyber threat intelligence.

What to Expect

SKILL LEVEL
Beginner
DURATION
3 days (Live Training) + Examination
CERTIFICATION
After Completion
LANGUAGE
English

Skills You Will Learn

  • Introduction to Threat Intelligence

  • Cyber Threats and Kill Chain Methodology

  • Requirements, Planning, Direction, and Review

  • Data Collection and Processing

  • Data Analysis

  • Intelligence Reporting and Dissemination

  • Introduction to Threat Intelligence

  • Cyber Threats and Kill Chain Methodology

  • Requirements, Planning, Direction, and Review

  • Data Collection and Processing

  • Data Analysis

  • Intelligence Reporting and Dissemination

  • Introduction to Threat Intelligence

  • Cyber Threats and Kill Chain Methodology

  • Requirements, Planning, Direction, and Review

  • Data Collection and Processing

  • Data Analysis

  • Intelligence Reporting and Dissemination

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Course Outcome

  • Enable individuals and organisations with the ability to prepare and run a threat intelligence program that allows evidence-based knowledge and provides actionable advice about existing and unknown threats

  • Ensure that organisations have predictive capabilities rather than just proactive measures beyond active defence mechanism

  • Empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program

  • Differentiate threat intelligence professionals from other information security professionals

  • Provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability

  • Enable individuals and organisations with the ability to prepare and run a threat intelligence program that allows evidence-based knowledge and provides actionable advice about existing and unknown threats

  • Ensure that organisations have predictive capabilities rather than just proactive measures beyond active defence mechanism

  • Empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program

  • Differentiate threat intelligence professionals from other information security professionals

  • Provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability

  • Enable individuals and organisations with the ability to prepare and run a threat intelligence program that allows evidence-based knowledge and provides actionable advice about existing and unknown threats

  • Ensure that organisations have predictive capabilities rather than just proactive measures beyond active defence mechanism

  • Empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program

  • Differentiate threat intelligence professionals from other information security professionals

  • Provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability

Course Intake

1 Jan 2025 → 1 March 2025

2 days | Monday and Thursday | 8PM → 10PM

Content Provider

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2