The Certified Threat Intelligence Analyst (CTIA) is an advanced certification developed by EC-Council to equip cybersecurity professionals with the skills to build effective threat intelligence programs. The course is designed to help organizations identify and mitigate business risks by transforming unknown internal and external threats into known threats. It follows a structured approach to threat intelligence, covering the entire lifecycle from planning and data collection to analysis and dissemination.
Who It’s For:
This course is ideal for threat intelligence analysts, SOC professionals, incident responders, penetration testers, digital forensic analysts, and mid- to senior-level cybersecurity professionals with at least three years of experience. It is also suitable for individuals seeking to specialize in cyber threat intelligence and enhance their ability to prevent and respond to cyber threats.
What You’ll Learn:
CTIA covers the fundamentals of threat intelligence, including intelligence types, lifecycle, and frameworks. It teaches how to collect and process data using OSINT, HUMINT, and malware analysis, analyze threat data using structured techniques, and create actionable intelligence reports. The course also explores threat intelligence sharing, cloud-based intelligence, and regulatory considerations.
Course Outline:
Introduction to Threat Intelligence
Cyber Threats and Attack Frameworks
Requirements, Planning, Direction, and Review
Data Collection and Processing
Data Analysis
Intelligence Reporting and Dissemination
Threat Hunting and Detection
Threat Intelligence in SOC Operations, Incident Response, and Risk Management
Why It’s Valuable for Federal Employees and Contractors:
CTIA aligns with the NICE Cybersecurity Workforce Framework and supports federal cybersecurity initiatives by enhancing the ability to anticipate, detect, and respond to threats. It is particularly valuable for roles in threat intelligence, SOC operations, and national security, where timely and accurate intelligence is critical for mission success.
Delivery Formats:
The CTIA program is available in multiple formats: In-Person Training, Online Self-Paced, and Online Instructor-Led.
none
Understand the principles and lifecycle of threat intelligence
Identify and classify cyber threats and adversaries
Collect and process threat data using OSINT and other sources
Analyze threat data using structured analytical techniques
Develop and disseminate actionable threat intelligence reports
Integrate threat intelligence into SOC and IR operations
Use threat intelligence for risk management and decision-making
Collaborate with external intelligence-sharing communities
Ensure compliance with legal and regulatory requirements
Enhance organizational threat detection and response capabilities
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.