Cyber Threat Intelligence Analyst (SF)
Course Code:
TGS-2023021376
Duration:
3 Days
Delivery Mode:
Classroom
Start Date:
11-09-24
End Date:
13-09-24
Fees:
$1956.55

(Before Funding)

The Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts from around the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach to building effective threat intelligence.

The program is based on a rigorous Job Task Analysis (JTA) of the roles involved in the field of threat intelligence. It differentiates threat intelligence professionals from other information security professionals. It is a highly interactive, comprehensive, and standards-based intensive 3-day training program that teaches information security professionals how to build professional threat intelligence. C|TIA is a method-driven program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report and disseminating threat intelligence. These concepts are essential for building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.

Key Learning Points for C|TIA Professionals:

  • Different data analysis types and techniques (Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)
  • Complete threat analysis process which includes threat modeling, fine-tuning, evaluation, runbook, and knowledge base creation.
  • Different data analysis, threat modeling, and threat intelligence tools.
  • Creating effective threat intelligence reports.
  • Threat intelligence dissemination and sharing (Dissemination preferences, intelligence collaboration, sharing rules and models, TI exchange types and architecture, participating in sharing relationships, standards and formats for sharing threat intelligence, etc.)
  • Different threat intelligence sharing platforms acts, and regulations for sharing strategic, tactical, operational, and technical intelligence.

Course Outline

Lesson 1: Introduction to Threat Intelligence
  • Understanding Intelligence
  • Understanding Cyber Threat Intelligence
  • Overview of the Threat Intelligence Lifecycle and Frameworks
Lesson 2: Cyber Threats and Kill Chain Methodology
  • Understanding Cyber Threats
  • Understanding Advanced Persistent Threats (APTs)
  • Understanding the Cyber Kill Chain
  • Understanding Indicators of Compromise (IoCs)
Lesson 3: Requirements, Planning, Direction, and Review
  • Understanding the Organization’s Current Threat Landscape
  • Understanding Requirements Analysis
  • Planning the Threat Intelligence Program
  • Establishing Management Support
  • Building a Threat Intelligence Team
  • Overview of Threat Intelligence Sharing
  • Reviewing the Threat Intelligence Program
Lesson 4: Data Collection and Processing
  • Overview of Threat Intelligence Data Collection
  • Overview of Threat Intelligence Collection Management
  • Overview of Threat Intelligence Feeds and Sources
  • Understanding Threat Intelligence Data Collection and Acquisition
  • Understanding Bulk Data Collection
  • Understanding Data Processing and Exploitation
Lesson 5: Data Analysis
  • Overview of Data Analysis
  • Understanding Data Analysis Techniques
  • Overview of Threat Analysis
  • Understanding the Threat Analysis Process
  • Overview of Fine-Tuning Threat Analysis
  • Understanding Threat Intelligence Evaluation
  • Creating Runbooks and a Knowledge Base
  • Overview of Threat Intelligence Tools
Lesson 6: Intelligence Reporting and Dissemination
  • Overview of Threat Intelligence Reports
  • Introduction to Dissemination
  • Participating in Sharing Relationships
  • Overview of Sharing Threat Intelligence
  • Overview of Delivery Mechanisms
  • Understanding Threat Intelligence Sharing Platforms
  • Overview of Intelligence Sharing Acts and Regulations
  • Overview of Threat Intelligence Integration

Course Fee (inclusive of 9% GST)

Criteria Individual Company Sponsored (Non-SME) Company Sponsored (SME)
Full Course Fee
$1956.55
SG Citizens aged 21 – 39 years old / PRs above 21 years old
$586.96
$586.96
$227.96
SG Citizens age 40 years old and above
$227.96
$227.96
$227.96
Course Prerequisite
There are no prerequisites for this course. However, students are strongly encouraged to take up this course as a supplement to the CEH and ECSA courses or any other cybersecurity specializations. To be eligible to challenge the C|TIA Exam, the candidate must either:
  • Attend official EC-Council C|TIA training through an accredited EC-Council Partner or
  • Submit an application showing a minimum of 3 years working experience in information security or software design (All candidates are required to pay USD 100 as a non-refundable application fee)
Important Notes
All Trainees must take note of the following:
  1. Must attend at least 75% of the course before being eligible to take the assessments.
  2. Dynamic QR Code Attendance Taking: a. Scan the QR Code that will be displayed by the Trainer on each session. Use your SingPass App to scan and submit your attendance. If you fail to do so, you will be deemed absent from that session. b. The QR Code is only accessible on: • Morning Session: between 9.00 am to 1.00 pm. • Afternoon Session: between 2.00 pm to 6.00 pm. c. Please take the attendance one at a time as the system can only register you one by one.
  3. Sign daily on the Attendance Sheet as a backup if any technical glitch happens.
  4. Submit Course Evaluation by the end of each module to help us improve the course and your future learning experience with us.
The course completion requirements for this course as follow:
  1. Attended at least 75% of the course.
  2. Declared as competent during the assessments.
Who Should Attend?
This program is designed for cybersecurity professionals, especially ethical hackers, security practitioners, engineers, analysts, specialist, architects, managers, threat intelligence analysts, associates, researchers, consultants, threat hunters, SOC professionals digital forensic and malware analysts, and incident response team members. As well as any mid-level to high-level cybersecurity professionals with a minimum of 3-5 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence and individuals interested in preventing cyber threats can also benefit from the program.

Why ITEL?

  • Diverse Range of IT Courses

    We offer a diverse range of IT courses tailored to student needs. Our curriculum covers foundational to advanced topics, ensuring comprehensive learning. We stay updated with industry trends to deliver relevant courses.

  • Skilled & Experienced Instructors

    We are proud to have a team of highly skilled and experienced instructors. Our instructors are industry professionals with in-depth knowledge and expertise across various IT domains.

  • Practical & Hands-on Exercises

    Our courses feature hands-on exercises, projects, and simulations to build practical skills. Students gain confidence by applying knowledge to real-world scenarios.

Course Enquiry for Cyber Threat Intelligence Analyst (SF)

"*" indicates required fields

I want to find out more about:
Consent*
Newsletter Subscription
This field is for validation purposes and should be left unchanged.