IT-Trainer Jobs und Stellenangebote: Certified Threat Intelligence Analyst (CTIA)
Seminardauer: 3 Tage
Trainer gesucht
IT-Trainer Jobs und Stellenangebote: Certified Threat Intelligence Analyst (CTIA), EC-Council, IT Security, IT-Security Spezialist.
Anmelden / Registrieren als Trainer
Agenda
Module 01: Introduction to Threat Intelligence
- Understand Intelligence
- Summarize Cyber Threat Intelligence Concepts
- Explain Threat Intelligence Lifecycle and Frameworks
- Understand Threat Intelligence Platforms (TIPs)
- Understand Threat Intelligence in the Cloud Environment
- Understand Future Trends and Continuous Learning
Module 02: Cyber Threats and Attack Frameworks
- Understand Cyber Threats
- Explain Advanced Persistent Threats
- Explain Cyber Kill Chain
- Explain MITRE ATT&CK and Diamond Model
- Understand Indicators of Compromise
Module 03: Requirements, Planning, Direction, and Review
- Understand the Organization’s Current Threat Landscape
- Understand Requirements Analysis
- Plan a Threat Intelligence Program
- Establish Management Support
- Build a Threat Intelligence Team
- Understand Threat Intelligence Sharing
- Review Threat Intelligence Program
Module 04: Data Collection and Processing
- Understand Threat Intelligence Data Collection
- Summarize Threat Intelligence Collection Management
- Explain Threat Intelligence Feeds and Sources
- Explain Threat Intelligence Data Collection and Acquisition
- Understand Bulk Data Collection
- Explain Data Processing and Exploitation
- Understand Threat Data Collection and Enrichment in Cloud Environments
Module 05: Data Analysis
- Summarize Data Analysis
- Explain Data Analysis Techniques
- Understand Threat Analysis
- Demonstrate Threat Analysis Process
- Explain Fine-tuning Threat Analysis
- Understand Threat Intelligence Evaluation
- Create Runbooks and Knowledge Base
- Use Threat Intelligence Tools
Module 06: Intelligence Reporting and Dissemination
- Understand Threat Intelligence Reports
- Understand Dissemination
- Participate in Sharing Relationships
- Understand Sharing Threat Intelligence
- Explain Delivery Mechanisms
- Use Threat Intelligence Sharing Platforms
- Understand Intelligence Sharing Acts and Regulations
- Explain Threat Intelligence Integration
- Understand Intelligence Sharing and Collaboration using Python Scripting
Module 07: Threat Hunting and Detection
- Summarize Threat Hunting Concepts
- Understand Threat Hunting Automation
Module 08: Threat Intelligence in SOC Operations, Incident Response, and Risk Management
- Understand Threat Intelligence in SOC Operations
- Understand Threat Intelligence in Risk Management
- Understand Threat Intelligence in Incident Response