CTIA Online Training

CTIA Online Training

0 STUDENTS ENROLLED

    Introduction​

    CTIA Training is a Council’s Threat Intelligence Analyst (CTIA) is a credentialing Certification program. Professionals that present an integrated process to gathering threat intelligence.

    Course Content

    1.Introduction to Threat Intelligence

    • Understanding Intelligence
    • Understanding Cyber Threat Intelligence
    • Overview of Threat Intelligence Lifecycle and Frameworks

    2.Cyber Threats and Kill Chain Methodology

    • Understanding Cyber Threats
    • Understanding Advanced Persistent Threats (APTs)
    • Understanding Cyber Kill Chain
    • Understanding Indicators of Compromise (IoCs)

    3.Requirements, Planning, Direction, and Review

    • Understanding Organization’s Current
    • Threat Landscape
    • Understanding Requirements Analysis
    • Planning Threat Intelligence Program
    • Establishing Management Support
    • Building a Threat Intelligence Team
    • Overview of Threat Intelligence Sharing
    • Reviewing Threat Intelligence Program

    4.Data Collection and Processing

    • Overview of Threat Intelligence Data Collection
    • Overview of Threat Intelligence Collection Management
    • Overview of Threat Intelligence Feeds and Sources
    • Understanding Threat Intelligence Data Collection and Acquisition
    • Understanding Bulk Data Collection
    • Understanding Data Processing and Exploitation

    5.Data Analysis

    • Overview of Data Analysis
    • Understanding Data Analysis Techniques
    • Overview of Threat Analysis
    • Understanding Threat Analysis Process
    • Overview of Fine-Tuning Threat Analysis
    • Understanding Threat Intelligence Evaluation
    • Creating Runbooks and Knowledge Base
    • Overview of Threat Intelligence Tools

    6.Dissemination and Reporting of Intelligence

    • Overview of Threat Intelligence Reports
    • Introduction to Dissemination
    • Participating in Sharing Relationships
    • Overview of Sharing Threat Intelligence
    • Overview of Delivery Mechanisms
    • Understanding Threat Intelligence Sharing Platforms
    • Overview of Intelligence Sharing Acts and Regulations
    • Overview of Threat Intelligence Integration

    Write a Review

    Your email address will not be published.

    Course Reviews

    N.A

    ratings
    • 5 stars0
    • 4 stars0
    • 3 stars0
    • 2 stars0
    • 1 stars0

    No Reviews found for this course.

    PRIVATE COURSE
    • PRIVATE
    • 3 weeks, 3 days
    Contact Us

    +1 475-212-0075

    Drop us a query

      Your Details


      * Required

      Job Support

        Your Details


        * Required

        Course Features

        Live Instructor-led Classes

        This isn't canned learning. Its dynamic, its interactive, its effective

        Expert Educators

        Only the best or they're out. We are constantly evaluating our trainers

        24&7 Support

        We never sleep. Need something answered at 3 am? No Problem

        Flexible Schedule

        You don't learn as per our calendar. We work according to yours.

        Customized Training's

        The most part self-managed and adaptable to suit a person's particular adapting technology needs

        Priority Based Training's

        Real-time Scenario based Assignments and Case Studies

        COPYRIGHT © 2020 KEEN IT TECHNOLOGIES PVT.LTD, ALL RIGHTS RESERVED