Cyber Threat Intelligence Analyst (SF) - ITEL

Cyber Threat Intelligence Analyst (SF)

Cybersecurity

Clientele

Cyber Threat Intelligence Analyst (SF)

Course Overview

The Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts from around the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach to building effective threat intelligence.

 

The program from EC-Council is based on a rigorous Job Task Analysis (JTA) of the roles involved in the field of threat intelligence. It differentiates threat intelligence professionals from other information security professionals. It is a highly interactive, comprehensive, and standards-based intensive 3-day training program that teaches information security professionals how to build professional threat intelligence. C|TIA is a method-driven program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report and disseminating threat intelligence. These concepts are essential for building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.

 

Key Learning Points for C|TIA Professionals:
  • Different data analysis types and techniques (Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)
  • Complete threat analysis process which includes threat modeling, fine-tuning, evaluation, runbook, and knowledge base creation.
  • Different data analysis, threat modeling, and threat intelligence tools.
  • Creating effective threat intelligence reports.
  • Threat intelligence dissemination and sharing (Dissemination preferences, intelligence collaboration, sharing rules and models, TI exchange types and architecture, participating in sharing relationships, standards and formats for sharing threat intelligence, etc.)
  • Different threat intelligence sharing platforms acts, and regulations for sharing strategic, tactical, operational, and technical intelligence.

Learning Outcomes

  • Threat Analysis Skills: Develop the ability to analyze and interpret threat data to identify potential risks and vulnerabilities.

  • Intelligence Gathering Techniques: Learn methodologies for collecting and evaluating threat intelligence from various sources.

  • Risk Assessment: Gain skills in assessing the impact of identified threats on organizational security and operations.

  • Reporting and Communication: Master the art of effectively communicating findings and recommendations to stakeholders through detailed reports.

  • Incident Response Planning: Understand how to contribute to the development of incident response strategies based on threat intelligence insights.

Who Should Attend?

This program is designed for cybersecurity professionals, especially ethical hackers, security practitioners, engineers, analysts, specialist, architects, managers, threat intelligence analysts, associates, researchers, consultants, threat hunters, SOC professionals digital forensic and malware analysts, and incident response team members. As well as any mid-level to high-level cybersecurity professionals with a minimum of 3-5 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence and individuals interested in preventing cyber threats can also benefit from the program.

Course Prerequisite

Demographics:

  • Age: Minimum 18 years old.

 

Education:

  • Minimum Diploma Level.
  • Language: Workplace Literacy and Numeracy Level 5 (WPLN: Speaking,
    Writing, Listening, Reading, and Numeracy at ESS level 5 or equivalent to
    Upper Secondary Level of English and Mathematics).

 

Technical Skills and Knowledge
Before attending this course, students must have the following technical knowledge:

  • Demonstrate familiarity with information security
  • The ability in analysing Risk Management and Penetration Testing
    Process.
  • Understanding of Ethical Hacking Process.

Potential Roles

  • Cyber Threat Intelligence Analyst

  • Cyber Threat Hunter

  • Cyber Threat Intelligence Associate/Researcher/Consultant

  • Cyber Security Information Security Threat Intelligence Analyst

  • Cyber Threat Intelligence Engineer/Specialist/Lead/Manager

  • SOC Threat Intellgence Analyst

  • Principal Cybercrime Threat Intelligence Analyst

  • Threat Management Associate Director

  • Project Manager/Director of Threat Intelligence

Course Outline

Lesson 1: Introduction to Threat Intelligence
  • Understanding Intelligence
  • Understanding Cyber Threat Intelligence
  • Overview of the Threat Intelligence Lifecycle and Frameworks

Lesson 2: Cyber Threats and Kill Chain Methodology
  • Understanding Cyber Threats
  • Understanding Advanced Persistent Threats (APTs)
  • Understanding the Cyber Kill Chain
  • Understanding Indicators of Compromise (IoCs)

Lesson 3: Requirements, Planning, Direction, and Review
  • Understanding the Organization’s Current Threat Landscape
  • Understanding Requirements Analysis
  • Planning the Threat Intelligence Program
  • Establishing Management Support
  • Building a Threat Intelligence Team
  • Overview of Threat Intelligence Sharing
  • Reviewing the Threat Intelligence Program

Lesson 4: Data Collection and Processing
  • Overview of Threat Intelligence Data Collection
  • Overview of Threat Intelligence Collection Management
  • Overview of Threat Intelligence Feeds and Sources
  • Understanding Threat Intelligence Data Collection and Acquisition
  • Understanding Bulk Data Collection
  • Understanding Data Processing and Exploitation

Lesson 5: Data Analysis
  • Overview of Data Analysis
  • Understanding Data Analysis Techniques
  • Overview of Threat Analysis
  • Understanding the Threat Analysis Process
  • Overview of Fine-Tuning Threat Analysis
  • Understanding Threat Intelligence Evaluation
  • Creating Runbooks and a Knowledge Base
  • Overview of Threat Intelligence Tools

Lesson 6: Intelligence Reporting and Dissemination
  • Overview of Threat Intelligence Reports
  • Introduction to Dissemination
  • Participating in Sharing Relationships
  • Overview of Sharing Threat Intelligence
  • Overview of Delivery Mechanisms
  • Understanding Threat Intelligence Sharing Platforms
  • Overview of Intelligence Sharing Acts and Regulations
  • Overview of Threat Intelligence Integration

Course Fee (inclusive of 9% GST)

Individual
Criteria Price inclusive of GST

Full Course Fee

$1,956.55

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,059.05

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$700.05

Criteria Price inclusive of GST

Full Course Fee

$1,956.55

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,059.05

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$700.05

Criteria Price inclusive of GST

Full Course Fee

$1,956.55

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$700.05

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$700.05

SkilsFuture Credit

SSG-funded courses are eligible for SkillsFuture Credit. Singaporeans over the age of 25 can use their Skillsfuture credit to register in courses.

Post-Secondary Education Account (PSEA)

All Singaporeans aged under 31 are eligible to use their PSEA account for the following course.

Course Dates

Course Dates Mode of Delivery Duration
Instructor-Led Training (ILT)
3 Days
Instructor-Led Training (ILT)
3 Days
Instructor-Led Training (ILT)
3 Days

SSG Funding Requirements

All Trainees must take note of the following:

 

  1. Must attend at least 75% of the course before being eligible to take the assessments.
  2. Dynamic QR Code Attendance Taking:
    a. Scan the QR Code that will be displayed by the Trainer on each session. Use your SingPass App to scan and submit your attendance. If you fail to do so, you will be deemed absent from that session.
    b. The QR Code is only accessible on:
    – Morning Session: between 9.00 am to 1.00 pm.
    – Afternoon Session: between 2.00 pm to 6.00 pm.
    Please take the attendance one at a time as the system can only register you one by one.
  3. Sign daily on the Attendance Sheet as a backup if any technical glitch happens.
  4. Submit Course Evaluation by the end of each module to help us improve the course and your future learning experience with us.

Certification

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion by ITEL

Course Code: TGS-2023021376
Course Support Period: 19 May 2023 to 31 Jan 2027

Note: All certificate images are for illustrative purposes only and may be subject to change at the discretion of ITEL.

e-Statement of Attainment (SOA) from SkillsFuture Singapore (SSG)

Upon meeting attendance requirements and passing the assessment(s), participants will receive an e-Statement of Attainment (SOA) from SkillsFuture Singapore (SSG).

External Certification Exam

The participant will be able to attempt the CTIA exam after attending this course. Upon passing the exam, the participant will receive CTIA accreditation from EC-Council.

FAQs

Is the CTIA worth getting?

Yes, the CTIA is a credible certification. The global market for cyber threat intelligence is expected to reach $21 billion by 2027, and the Certified Threat Intelligence Analyst (CTA) certification demonstrates your competence in combating cyber threats. With global recognition, the certification leads professionals to better opportunities, advancing careers and aligning them with the industry standards in the dynamic cybersecurity landscape.

To become a Certified Threat Intelligence Analyst, one must complete the two-hour CTIA exam by pursuing this Cyber Threat Intelligence Analyst (SF) course. The CTIA is an advanced program for cybersecurity professionals to enhance their expertise in threat intelligence. An individual who aspires to be a threat intelligence analyst must have professional experience in cybersecurity, IT, or any related field.

Students with fundamental knowledge of threat intelligence and professional experience in cybersecurity or IT fields can enroll in Cyber Threat Intelligence Analyst (SF) course that equips them with the knowledge in all stages of the threat intelligence life cycle, with hands-on skills in data collection, analysis, intelligence production, and more. Obtain the certification on passing the CTIA certification exam after the course with a cut-score of 70%. Further, stay current on the latest trends and advancements to develop leadership skills that contribute to the industry.

  • Cyber Threat Intelligence Analyst
  • Cyber Threat Hunter
  • Cyber Threat Intelligence Associate / Researcher / Consultant
  • Cybersecurity / Information Security Threat Intelligence Analyst
  • Cyber Threat Intelligence Engineer / Specialist / Lead / Manager
  • SOC Threat Intelligence Analyst
  • Principal Cybercrime Threat Intelligence Analyst
  • Threat Management Associate Director
  • Project Manager / Director of Threat Intelligence

The CTIA certification program is designed for mid to high-level cybersecurity professionals with at least 2 years of experience in cybersecurity, IT, or related fields.

Certified Threat Intelligence Analysts are the force multiplier of an organization responsible for analyzing cyber threats, focusing on the threats, focusing on the threat actors’ techniques and procedures. They convert the analysis into intelligence that can be helpful for the organization in strengthening the defenses.

The CTIA is a highly demanded certification program, designed and developed by industry experts. This certification was created by a rigorous job task analysis of job roles in the threat intelligence field, which makes cybersecurity professionals pursue CTIA to gain market-relevant skills and employability.

CTIA is a professional certification program, designed and developed by cybersecurity and threat intelligence experts worldwide. It focuses on all the stages of a threat cycle, emphasizing data collection, attackers’ TTPs, and converting refined data to actionable intelligence. It offers a 60:40 theory and practical ratio, hands-on skills, and a 360-degree approach to prepare candidates to secure organizations from potential threats.

A Threat Intelligence Analyst strengthens cybersecurity defenses by proactively identifying and analyzing potential threats. A Threat Intelligence Analyst equipped with CTIA certification can help proactively identify and assess potential risks through comprehensive threat intelligence analysis. This certification validates an individual’s ability to understand threat actors’ tactics, techniques and procedures (TTPs), enabling them to contribute to a comprehensive cybersecurity posture.

Learner's Testimonials [x]

Early registrations are encouraged.  

Cyber Threat Intelligence Analyst (SF)

Instructor-Led Training (ILT)

3 Days

From S$700.05 (After Eligible SSG Subsidies)

Download Cyber Threat Intelligence Analyst (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Big Data Analytics (SF) Brochure (Testing)

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Big Data Analytics (SF) Brochure (Testing)

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Data Science and Machine Learning (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download CompTIA Security+ (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Data Science and Machine Learning (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Solutions Associate (MCSA) – 20742 (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Solutions Associate (MCSA) – 20741 (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Solutions Associate (MCSA) – 20740 (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Business Analysis Professional (SF) (Synchronous E-Learning) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Azure Security Technologies (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Implementing SQL Database Administration (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download VMware Vsphere: Install, Configure, Manage (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Design Mobile Applications on Android OS Platform (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download CompTIA Network+ (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download CompTIA Cloud Essentials+ (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Big Data Analytics (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Network Defender (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download ITIL® Foundation Certificate in Service Management (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Project Management (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Windows Server 2019 Administration (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Windows Server 2019 Administration (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cloud Technology Solutions Architect Associate (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Security Analysis and Penetration Testing (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Information Systems Security (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified: Azure Fundamentals (AZ-900) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Azure Network Engineer Associate (AZ-700) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Forensics Investigator (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Security Incident Handling and Response (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Advanced Certificate in Cyber Security Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Higher Certificate in Network Administration Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Strategic Cyber Security Leadership (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cisco Certified Network Associate (CCNA) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Course Listing Download Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Cisco Certified Network Associate Download Course Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List
Course Enquiry for Cyber Threat Intelligence Analyst (SF)

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
I want to find out more about:*
Where did you hear of ITEL?*
*Note: If you chose Others, kindly provide more information in the Remarks/Comments/Questions box.
Consent*
Newsletter Subscription