It is a course designed to identify and mitigate business risks by converting unknown internal and external threats into known threats. A careful business mission analysis (JTA) of the role roles involved in the threat intelligence field will also be discussed. This program distinguishes intelligence professionals as a threat from other information security professionals.
It is an essential course for those who deal with cyber threats on a daily basis. It uses a comprehensive approach, covering concepts from planning a threat intelligence project to building a report to publishing intelligence about a threat.
This program addresses all stages involved in the IQ threat lifecycle, with attention to a realistic and future approach that makes CTIA one of the most comprehensive threat intelligence certifications on the market today. This program provides the solid and professional knowledge required for a career in the intelligence intelligence field, and enhances your skills as a threat intelligence analyst.
Course Overview
It is a course designed to identify and mitigate business risks by converting unknown internal and external threats into known threats. A careful business mission analysis (JTA) of the role roles involved in the threat intelligence field will also be discussed. This program distinguishes intelligence professionals as a threat from other information security professionals.
Course Outlines
- Introduction to Threat Intelligence
- Cyber Threats and Kill Chain Methodology
- Requirements, Planning, Direction, and Review
- Data Collection and Processing
- Data Analysis
- Intelligence Reporting and Dissemination
Course Objectives
After completing this course you should be able to understand:
- Key issues plaguing the information security world
- Importance of threat intelligence in risk management, SIEM, and incident response
- Various types of cyber threats, threat actors and their motives, goals, and objectives of cybersecurity attacks
- Fundamentals of threat intelligence (including threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, etc. )
- Cyber kill chain methodology, Advanced Persistent Threat (APT) lifecycle, Tactics, Techniques, and Procedures (TTPs), Indicators of compromise (loCs), and pyramid of pain.
- Various steps involved in planning a threat intelligence program (Requirements, Planning, Direction, and Review)
- Different Types of data feeds, sources and data collection methods
- Threat intelligence data collection and acquisition through Open Source intelligence (OSINT) , Human intelligence (HUMINT) , Cyber counterintelligence (CCI) , Indicators of Compromise (loCs) , and malware analysis.
- Bulk data collection and managemet (data processing , structuring, normalization, sampling, storing and visualization)
- Different data analysis types and techniques including statistical Data Analysis , Analysis of Competing Hypotheses (ACH) , Structured Analysis of Competing Hypotheses (SACH), etc.
- Compare threat analysis process which includes threat modeling , fine-tuning, evaluation, runbook, and knowledge base creation
- Different data analysis, threat modeling , and threat intelligence tools
- Threat intelligence dissemination and sharing protocol including dissemination preferences , intelligence collaboration, sharing rules and models, IT exchange types and architectures, participating in sharing relationships, standards, and formats for sharing threat intelligence
- Creating effective threat intelligence reports
- Different threat intelligence sharing platforms, acts, and regulations for sharing strategic, tactical, operational, and technical intelligence
Course Prerequisites
There are no prerequisites to take the CTIA course.
Course Schedule
Course | Date | Days | Location |
CTIA | 10-Mar-24 | 3 | Cairo, Egypt + live virtual online |
CTIA | 02-Jun-24 | 3 | Cairo, Egypt + live virtual online |
CTIA | 07-Sep-24 | 3 | Cairo, Egypt + live virtual online |
CTIA | 24-Nov-24 | 3 | Cairo, Egypt + live virtual online |
- In-Person Training:
Benefits:
Personal Interaction: Participants can interact with the instructor and fellow learners, fostering a sense of community.
Immediate Feedback: Instructors can provide real-time feedback, addressing questions and concerns on the spot.
Hands-on Activities: Practical exercises and group activities can be conducted more effectively in person.
- Online Training:
Benefits:
Flexibility: Learners can access the course content at their own pace and time, accommodating diverse schedules.
Cost-Effective: Eliminates the need for travel and accommodation expenses, making it more economical.
Scalability: Can accommodate a large number of participants simultaneously, making it suitable for widespread audiences.
- Blended Learning (Combination of In-Person and Online):
Benefits:
Flexibility: Combines the advantages of both in-person and online formats, offering a balance between structure and autonomy.
Cost-Efficiency: Reduces the need for extensive in-person sessions, saving on travel and venue costs.
Adaptability: Can cater to diverse learning styles by incorporating various modes of instruction.
- Virtual Classrooms:
Benefits:
Real-Time Interaction: Allows for live Q&A sessions, discussions, and engagement with participants.
Accessibility: Participants from different locations can join without the need for physical presence.
Recording Options: Recordings can be made available for participants who may have missed the live session.
- Self-Paced Learning (eLearning Modules, Videos):
Benefits:
Individualized Learning: Participants can progress at their speed, revisiting content as needed.
Consistency: Ensures uniform delivery of content to all participants.
24/7 Accessibility: Learners can access materials whenever and wherever is convenient for them.
- Customized Courses:
Relevant Content: Tailored to specific organizational goals.
Industry Focus: Incorporates real industry challenges.
Adapted Learning: Matches varied skill levels of participants.
Focused Skills: Targets key competencies for job success.
Cultural Sensitivity: Respects diverse backgrounds within the organization.
Engaging Content: Uses relatable examples and scenarios.
Flexible Delivery: Adaptable to different learning formats.
Measurable Success: Sets clear objectives for easy evaluation.
Continuous Improvement: Uses feedback for ongoing enhancements.
Cost-Effective: Efficiently directs resources for maximum impact.