IT-Trainer Jobs und Stellenangebote: Certified Threat Intelligence Analyst (CTIA)

Seminardauer: 3 Tage

Trainer gesucht

IT-Trainer Jobs und Stellenangebote: Certified Threat Intelligence Analyst (CTIA), EC-Council, IT Security, IT-Security Spezialist.

Anmelden / Registrieren als Trainer

Agenda

Module 01: Introduction to Threat Intelligence

  • Understand Intelligence
  • Summarize Cyber Threat Intelligence Concepts
  • Explain Threat Intelligence Lifecycle and Frameworks
  • Understand Threat Intelligence Platforms (TIPs)
  • Understand Threat Intelligence in the Cloud Environment
  • Understand Future Trends and Continuous Learning

Module 02: Cyber Threats and Attack Frameworks

  • Understand Cyber Threats
  • Explain Advanced Persistent Threats
  • Explain Cyber Kill Chain
  • Explain MITRE ATT&CK and Diamond Model
  • Understand Indicators of Compromise

Module 03: Requirements, Planning, Direction, and Review

  • Understand the Organization’s Current Threat Landscape
  • Understand Requirements Analysis
  • Plan a Threat Intelligence Program
  • Establish Management Support
  • Build a Threat Intelligence Team
  • Understand Threat Intelligence Sharing
  • Review Threat Intelligence Program

Module 04: Data Collection and Processing

  • Understand Threat Intelligence Data Collection
  • Summarize Threat Intelligence Collection Management
  • Explain Threat Intelligence Feeds and Sources
  • Explain Threat Intelligence Data Collection and Acquisition
  • Understand Bulk Data Collection
  • Explain Data Processing and Exploitation
  • Understand Threat Data Collection and Enrichment in Cloud Environments

Module 05: Data Analysis

  • Summarize Data Analysis
  • Explain Data Analysis Techniques
  • Understand Threat Analysis
  • Demonstrate Threat Analysis Process
  • Explain Fine-tuning Threat Analysis
  • Understand Threat Intelligence Evaluation
  • Create Runbooks and Knowledge Base
  • Use Threat Intelligence Tools

Module 06: Intelligence Reporting and Dissemination

  • Understand Threat Intelligence Reports
  • Understand Dissemination
  • Participate in Sharing Relationships
  • Understand Sharing Threat Intelligence
  • Explain Delivery Mechanisms
  • Use Threat Intelligence Sharing Platforms
  • Understand Intelligence Sharing Acts and Regulations
  • Explain Threat Intelligence Integration
  • Understand Intelligence Sharing and Collaboration using Python Scripting

Module 07: Threat Hunting and Detection

  • Summarize Threat Hunting Concepts
  • Understand Threat Hunting Automation

Module 08: Threat Intelligence in SOC Operations, Incident Response, and Risk Management

  • Understand Threat Intelligence in SOC Operations
  • Understand Threat Intelligence in Risk Management
  • Understand Threat Intelligence in Incident Response