{"course":{"productid":20043,"modality":1,"active":true,"language":"en","title":"EC-Council Certified Threat Intelligence Analyst","productcode":"CTIA","vendorcode":"EC","vendorname":"EC-Council","fullproductcode":"EC-CTIA","courseware":{"has_ekit":false,"has_printkit":true,"language":""},"url":"https:\/\/portal.flane.ch\/course\/ec-ctia","objective":"<ul>\n<li>Fundamentals of threat intelligence (Threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, platforms, etc.)<\/li><li>Various cyber security threats and attack frameworks (Advanced Persistent Threats, Cyber Kill Chain Methodology, MITRE ATT&amp;CK Framework, Diamond Model of Intrusion Analysis, etc.)<\/li><li>Various steps involved in planning a threat intelligence program (Requirements, planning, direction, and review)<\/li><li>Different types of threat intelligence feeds, sources, data collection methods<\/li><li>Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), Malware Analysis, and Python Scripting<\/li><li>Threat intelligence data processing and exploitation<\/li><li>Threat data analysis techniques (Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)<\/li><li>Complete threat analysis process, which includes threat modeling, fine-tuning, evaluation, and runbook and knowledge base creation<\/li><li>How to create and share threat intelligence reports<\/li><li>Threat intelligence sharing and collaboration using Python scripting<\/li><li>Different platforms, acts, and regulations for sharing intelligence<\/li><li>How to perform threat intelligence in a cloud environment<\/li><li>Fundamentals of threat hunting (Threat hunting types, process, loop, methodology, etc.)<\/li><li>Threat-hunting automation using Python scripting<\/li><li>Threat intelligence in SOC operations, incident response, and risk management<\/li><\/ul>","essentials":"<ul>\n<li>Any Mid-level to high-level cybersecurity professionals with a minimum of 3 years of experience.<\/li><li>Individuals with EC-Council&rsquo;s recognized C|EH and C|ND certifications can enroll for this course.<\/li><\/ul>","audience":"<ul>\n<li>Cyber Threat Intelligence Analyst<\/li><li>Cyber Threat Hunter<\/li><li>Cyber Threat Intelligence Associate\/Researcher\/Consultant<\/li><li>Cybersecurity\/Information Security Threat Intelligence Analyst<\/li><li>Cyber Threat Intelligence Engineer\/Specialist\/Lead\/Manager<\/li><li>SOC Threat Intelligence Analyst<\/li><li>Principal Cybercrime Threat Intelligence Analyst<\/li><li>Threat Management Associate Director<\/li><li>Project Manager\/Director of Threat Intelligence<\/li><\/ul>","contents":"<ul>\n<li>Module 01: Introduction to Threat Intelligence<\/li><li>Module 02: Cyber Threats and Attack Frameworks<\/li><li>Module 03: Requirements, Planning, Direction, and Review<\/li><li>Module 04: Data Collection and Processing<\/li><li>Module 05: Data Analysis<\/li><li>Module 06: Intelligence Reporting and Dissemination<\/li><li>Module 07: Threat Hunting and Detection<\/li><li>Module 08: Threat Intelligence in SOC Operations, Incident Response, and Risk Management<\/li><\/ul>","summary":"<p>C|TIA is designed for individuals who are involved in the collection, analysis, and dissemination of threat intelligence information. It covers a range of topics, including the fundamentals of threat intelligence, the use of threat intelligence tools and techniques, and the development of a threat intelligence program.<\/p>","objective_plain":"- Fundamentals of threat intelligence (Threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, platforms, etc.)\n- Various cyber security threats and attack frameworks (Advanced Persistent Threats, Cyber Kill Chain Methodology, MITRE ATT&CK Framework, Diamond Model of Intrusion Analysis, etc.)\n- Various steps involved in planning a threat intelligence program (Requirements, planning, direction, and review)\n- Different types of threat intelligence feeds, sources, data collection methods\n- Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), Malware Analysis, and Python Scripting\n- Threat intelligence data processing and exploitation\n- Threat data analysis techniques (Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)\n- Complete threat analysis process, which includes threat modeling, fine-tuning, evaluation, and runbook and knowledge base creation\n- How to create and share threat intelligence reports\n- Threat intelligence sharing and collaboration using Python scripting\n- Different platforms, acts, and regulations for sharing intelligence\n- How to perform threat intelligence in a cloud environment\n- Fundamentals of threat hunting (Threat hunting types, process, loop, methodology, etc.)\n- Threat-hunting automation using Python scripting\n- Threat intelligence in SOC operations, incident response, and risk management","essentials_plain":"- Any Mid-level to high-level cybersecurity professionals with a minimum of 3 years of experience.\n- Individuals with EC-Council\u2019s recognized C|EH and C|ND certifications can enroll for this course.","audience_plain":"- Cyber Threat Intelligence Analyst\n- Cyber Threat Hunter\n- Cyber Threat Intelligence Associate\/Researcher\/Consultant\n- Cybersecurity\/Information Security Threat Intelligence Analyst\n- Cyber Threat Intelligence Engineer\/Specialist\/Lead\/Manager\n- SOC Threat Intelligence Analyst\n- Principal Cybercrime Threat Intelligence Analyst\n- Threat Management Associate Director\n- Project Manager\/Director of Threat Intelligence","contents_plain":"- Module 01: Introduction to Threat Intelligence\n- Module 02: Cyber Threats and Attack Frameworks\n- Module 03: Requirements, Planning, Direction, and Review\n- Module 04: Data Collection and Processing\n- Module 05: Data Analysis\n- Module 06: Intelligence Reporting and Dissemination\n- Module 07: Threat Hunting and Detection\n- Module 08: Threat Intelligence in SOC Operations, Incident Response, and Risk Management","summary_plain":"C|TIA is designed for individuals who are involved in the collection, analysis, and dissemination of threat intelligence information. It covers a range of topics, including the fundamentals of threat intelligence, the use of threat intelligence tools and techniques, and the development of a threat intelligence program.","skill_level":"Expert","version":"2","duration":{"unit":"d","value":3,"formatted":"3 days"},"pricelist":{"List Price":{"DE":{"country":"DE","currency":"EUR","taxrate":19,"price":2950},"SI":{"country":"SI","currency":"EUR","taxrate":20,"price":2950},"UA":{"country":"UA","currency":"EUR","taxrate":20,"price":2950},"AT":{"country":"AT","currency":"EUR","taxrate":20,"price":2950},"NL":{"country":"NL","currency":"EUR","taxrate":21,"price":2950},"PL":{"country":"PL","currency":"EUR","taxrate":23,"price":2950},"IL":{"country":"IL","currency":"ILS","taxrate":17,"price":10230},"GR":{"country":"GR","currency":"EUR","taxrate":null,"price":2950},"MK":{"country":"MK","currency":"EUR","taxrate":null,"price":2950},"HU":{"country":"HU","currency":"EUR","taxrate":20,"price":2950},"US":{"country":"US","currency":"USD","taxrate":null,"price":2097},"CA":{"country":"CA","currency":"CAD","taxrate":null,"price":2895},"CH":{"country":"CH","currency":"CHF","taxrate":8.1,"price":2950}}},"lastchanged":"2025-07-29T12:17:56+02:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/en\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/en\/json-course-schedule\/20043","source_lang":"en","source":"https:\/\/portal.flane.ch\/swisscom\/en\/json-course\/ec-ctia"}}