C)TIA: Certified Threat Intelligence Analyst

CTIA (Certified Threat Intelligence Analyst) course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them. The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture.

Retail Price: $3,500.00

Next Date: Request Date

Course Days: 3


Request a Date

Request Custom Course


Upon Completion

Upon completion, Certified Threat Intelligence Analyst course students will have knowledge to perform thorough threat analysis on any information system. Be able to accurately report on their findings, and be ready to sit for the C)TIA exam.

 

Who Should Attend?

* Penetration Testers

* Microsoft Administrator

* Security Administrators

* Active Directory Administrators

* Anyone looking to learn more about security

Available as Self-Study Ultimate Combo for $1,200.00 and includes:

• One Year Online Course Access
• Videos
• Workbook
• Lab Guide
• Cyber Range Access
• Exam Prep Guide
• Practice Quiz
• Certification Exam (2 attempts)


Course Outline

Module 1: Incident Handling Explained

Module 2: Incident Response Policy, Plan and Procedures.

Module 3: Incident Response Team Structure

Module 4: Incident Response Team Services

Module 5: Incident Response Recommendations

Module 6: Preparation

Module 7: Detection and Analysis

Module 8: Containment, Eradication and Recovery

Module 9: GRR Rapid Response

Module 10: Request Tracker

Module 11:  Post Incident Activity

Module 12: Recommendations

Module 13: References

Module 14: Information Sharing

Hands On Cyber Range Live Labs

Lab 1: Identifying Incident Triggers

Lab 2: Drafting Incident Response Proceedures

Lab 3: Planning for Dependencies

Lab 4: Testing your plan

Lab 5: Drafting Security Policies

Lab 6: Practicing Attack Vectors

Lab 7: Deploy GRR Client

Lab 8: Create Request Tracker Workflow

Lab 9: Lessons Learned

Lab 10: Create a Checklist

Lab 11: Draft Response Improvement Recommendations

Lab 12: Sharing Agreements



Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com


Request a Date