Certified Threat Intelligence Analyst
Identify and mitigate business risks by converting unknown internal and external threats into quantifiable threat entities and stop them in their tracks.



Ideal For
Certified Threat Intelligence Analyst requires a minimum of 2 years of experience and is suitable for mid-level to high-level cybersecurity professionals. It is also for information security professionals who want to enrich their skills and knowledge in the field of cyber threat intelligence.
Certified Threat Intelligence Analyst requires a minimum of 2 years of experience and is suitable for mid-level to high-level cybersecurity professionals. It is also for information security professionals who want to enrich their skills and knowledge in the field of cyber threat intelligence.
Certified Threat Intelligence Analyst requires a minimum of 2 years of experience and is suitable for mid-level to high-level cybersecurity professionals. It is also for information security professionals who want to enrich their skills and knowledge in the field of cyber threat intelligence.
What to Expect
SKILL LEVEL
Beginner
DURATION
3 days (Live Training) + Examination
CERTIFICATION
After Completion
LANGUAGE
English
Skills You Will Learn
Introduction to Threat Intelligence
Cyber Threats and Kill Chain Methodology
Requirements, Planning, Direction, and Review
Data Collection and Processing
Data Analysis
Intelligence Reporting and Dissemination
Introduction to Threat Intelligence
Cyber Threats and Kill Chain Methodology
Requirements, Planning, Direction, and Review
Data Collection and Processing
Data Analysis
Intelligence Reporting and Dissemination
Introduction to Threat Intelligence
Cyber Threats and Kill Chain Methodology
Requirements, Planning, Direction, and Review
Data Collection and Processing
Data Analysis
Intelligence Reporting and Dissemination
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Course Outcome
Enable individuals and organisations with the ability to prepare and run a threat intelligence program that allows evidence-based knowledge and provides actionable advice about existing and unknown threats
Ensure that organisations have predictive capabilities rather than just proactive measures beyond active defence mechanism
Empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program
Differentiate threat intelligence professionals from other information security professionals
Provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability
Enable individuals and organisations with the ability to prepare and run a threat intelligence program that allows evidence-based knowledge and provides actionable advice about existing and unknown threats
Ensure that organisations have predictive capabilities rather than just proactive measures beyond active defence mechanism
Empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program
Differentiate threat intelligence professionals from other information security professionals
Provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability
Enable individuals and organisations with the ability to prepare and run a threat intelligence program that allows evidence-based knowledge and provides actionable advice about existing and unknown threats
Ensure that organisations have predictive capabilities rather than just proactive measures beyond active defence mechanism
Empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program
Differentiate threat intelligence professionals from other information security professionals
Provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability
Course Intake
1 Jan 2025 → 1 March 2025
2 days | Monday and Thursday | 8PM → 10PM
Content Provider



EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2