EC-Council Certified Threat Intelligence Analyst + Voucher d'examen
- Référence CTIA
- Durée 3 jour(s)
- Version 2
Modalité pédagogique
Modalité pédagogique
La formation est disponible dans les formats suivants:
-
Classe inter à distance
Depuis n'importe quelle salle équipée d'une connexion internet, rejoignez la classe de formation délivrée en inter-entreprises.
-
Classe inter en présentiel
Formation délivrée en inter-entreprises. Cette méthode d'apprentissage permet l'interactivité entre le formateur et les participants en classe.
-
Intra-entreprise
Cette formation est délivrable en groupe privé, et adaptable selon les besoins de l’entreprise. Nous consulter.
Demander cette formation dans un format différent
Résumé
Haut de pageEC-Council’s Certified Threat Intelligence Analyst (C|TIA) certification is a comprehensive, specialist-level program focused on the rapidly evolving field of threat intelligence. The certification is designed for professionals involved in collecting, analyzing, and disseminating cyber threat intelligence within organizations.
The C|TIA program covers key areas such as threat intelligence fundamentals, threat intelligence tools and techniques, and the development and management of threat intelligence programs. The course emphasizes transforming raw data into actionable intelligence that can be used to prevent, detect, and monitor cyber-attacks effectively.
C|TIA addresses every stage of the threat intelligence lifecycle, providing learners with a practical and future-oriented approach to modern cybersecurity challenges. This makes it one of the most comprehensive threat intelligence certifications currently available in the market.
The certification equips professionals with the knowledge and practical insights required to build a successful career in threat intelligence while strengthening their analytical and operational cybersecurity skills. It is highly valued by cybersecurity professionals worldwide and recognized by employers across the industry.
C|TIA is particularly suitable for professionals working in information security, network security, incident response, cyber defense, and related domains. Earning this certification can help individuals and teams enhance their threat intelligence capabilities, improve cybersecurity operations, and support informed security decision-making.
Updated 14/05/2026
Formation intra-entreprise
Cette formation est délivrable en session intra-entreprise, dans vos locaux ou dans les nôtres. Son contenu peut être adapté sur-mesure pour répondre aux besoins de vos collaborateurs. Contactez votre conseiller formation Global Knowledge ou adressez votre demande à info@globalknowledge.fr.
Prochaines dates
Haut de pagePublic
Haut de page- Mid-level to senior-level cybersecurity professionals with a minimum of three years of experience in cybersecurity or related domains.
- Professionals holding Certified Ethical Hacker (C|EH) and Certified Network Defender (C|ND) certifications are also eligible to enroll in the program.
Objectifs de la formation
Haut de pageAfter completing this course you should be able to understand:
- Fundamentals of threat intelligence, including threat intelligence types, lifecycle, strategy, capabilities, maturity models, frameworks, and platforms
- Various cybersecurity threats and attack frameworks, including Advanced Persistent Threats (APTs), Cyber Kill Chain Methodology, MITRE ATT&CK Framework, and Diamond Model of Intrusion Analysis
- Planning and managing a threat intelligence program, including requirements gathering, planning, direction, and review
- Different types of threat intelligence feeds, intelligence sources, and data collection methods
- Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), malware analysis, and Python scripting
- Threat intelligence data processing and exploitation techniques
- Threat data analysis methodologies, including Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), and Structured Analysis of Competing Hypotheses (SACH)
- Complete threat analysis processes, including threat modeling, fine-tuning, evaluation, and runbook and knowledge base creation
- Threat intelligence sharing and collaboration using Python scripting
- Different platforms, acts, and regulations related to threat intelligence sharing
- Performing threat intelligence activities in cloud environments
- Fundamentals of threat hunting, including threat hunting types, processes, loops, and methodologies
- Threat-hunting automation using Python scripting
- The role of threat intelligence in Security Operations Center (SOC) operations, incident response, and risk management
Pré-requis
Haut de pageAttendees should meet the following prerequisites:
- Minimum of three years of cybersecurity industry experience
- C|EH or C|ND certification holders are eligible to enroll in the course
Certification
Haut de pageRecommended as preparation for the following exams:
- 312-85 - Certified Threat Intelligence Analyst
Exam Details:
- Number of Questions: 50
- Duration: 2 hours
- Test Format: Multiple Choice Questions (MCQs)
- Availability: EC-Council Exam Portal