<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="20043" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/ec-ctia" lastchanged="2025-07-29T12:17:56+02:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>EC-Council Certified Threat Intelligence Analyst</title><productcode>CTIA</productcode><vendorcode>EC</vendorcode><vendorname>EC-Council</vendorname><fullproductcode>EC-CTIA</fullproductcode><version>2</version><objective>&lt;ul&gt;
&lt;li&gt;Fundamentals of threat intelligence (Threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, platforms, etc.)&lt;/li&gt;&lt;li&gt;Various cyber security threats and attack frameworks (Advanced Persistent Threats, Cyber Kill Chain Methodology, MITRE ATT&amp;amp;CK Framework, Diamond Model of Intrusion Analysis, etc.)&lt;/li&gt;&lt;li&gt;Various steps involved in planning a threat intelligence program (Requirements, planning, direction, and review)&lt;/li&gt;&lt;li&gt;Different types of threat intelligence feeds, sources, data collection methods&lt;/li&gt;&lt;li&gt;Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), Malware Analysis, and Python Scripting&lt;/li&gt;&lt;li&gt;Threat intelligence data processing and exploitation&lt;/li&gt;&lt;li&gt;Threat data analysis techniques (Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)&lt;/li&gt;&lt;li&gt;Complete threat analysis process, which includes threat modeling, fine-tuning, evaluation, and runbook and knowledge base creation&lt;/li&gt;&lt;li&gt;How to create and share threat intelligence reports&lt;/li&gt;&lt;li&gt;Threat intelligence sharing and collaboration using Python scripting&lt;/li&gt;&lt;li&gt;Different platforms, acts, and regulations for sharing intelligence&lt;/li&gt;&lt;li&gt;How to perform threat intelligence in a cloud environment&lt;/li&gt;&lt;li&gt;Fundamentals of threat hunting (Threat hunting types, process, loop, methodology, etc.)&lt;/li&gt;&lt;li&gt;Threat-hunting automation using Python scripting&lt;/li&gt;&lt;li&gt;Threat intelligence in SOC operations, incident response, and risk management&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;Any Mid-level to high-level cybersecurity professionals with a minimum of 3 years of experience.&lt;/li&gt;&lt;li&gt;Individuals with EC-Council&amp;rsquo;s recognized C|EH and C|ND certifications can enroll for this course.&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;ul&gt;
&lt;li&gt;Cyber Threat Intelligence Analyst&lt;/li&gt;&lt;li&gt;Cyber Threat Hunter&lt;/li&gt;&lt;li&gt;Cyber Threat Intelligence Associate/Researcher/Consultant&lt;/li&gt;&lt;li&gt;Cybersecurity/Information Security Threat Intelligence Analyst&lt;/li&gt;&lt;li&gt;Cyber Threat Intelligence Engineer/Specialist/Lead/Manager&lt;/li&gt;&lt;li&gt;SOC Threat Intelligence Analyst&lt;/li&gt;&lt;li&gt;Principal Cybercrime Threat Intelligence Analyst&lt;/li&gt;&lt;li&gt;Threat Management Associate Director&lt;/li&gt;&lt;li&gt;Project Manager/Director of Threat Intelligence&lt;/li&gt;&lt;/ul&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Module 01: Introduction to Threat Intelligence&lt;/li&gt;&lt;li&gt;Module 02: Cyber Threats and Attack Frameworks&lt;/li&gt;&lt;li&gt;Module 03: Requirements, Planning, Direction, and Review&lt;/li&gt;&lt;li&gt;Module 04: Data Collection and Processing&lt;/li&gt;&lt;li&gt;Module 05: Data Analysis&lt;/li&gt;&lt;li&gt;Module 06: Intelligence Reporting and Dissemination&lt;/li&gt;&lt;li&gt;Module 07: Threat Hunting and Detection&lt;/li&gt;&lt;li&gt;Module 08: Threat Intelligence in SOC Operations, Incident Response, and Risk Management&lt;/li&gt;&lt;/ul&gt;</contents><objective_plain>- Fundamentals of threat intelligence (Threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, platforms, etc.)
- Various cyber security threats and attack frameworks (Advanced Persistent Threats, Cyber Kill Chain Methodology, MITRE ATT&amp;CK Framework, Diamond Model of Intrusion Analysis, etc.)
- Various steps involved in planning a threat intelligence program (Requirements, planning, direction, and review)
- Different types of threat intelligence feeds, sources, data collection methods
- Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), Malware Analysis, and Python Scripting
- Threat intelligence data processing and exploitation
- Threat data analysis techniques (Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.)
- Complete threat analysis process, which includes threat modeling, fine-tuning, evaluation, and runbook and knowledge base creation
- How to create and share threat intelligence reports
- Threat intelligence sharing and collaboration using Python scripting
- Different platforms, acts, and regulations for sharing intelligence
- How to perform threat intelligence in a cloud environment
- Fundamentals of threat hunting (Threat hunting types, process, loop, methodology, etc.)
- Threat-hunting automation using Python scripting
- Threat intelligence in SOC operations, incident response, and risk management</objective_plain><essentials_plain>- Any Mid-level to high-level cybersecurity professionals with a minimum of 3 years of experience.
- Individuals with EC-Council’s recognized C|EH and C|ND certifications can enroll for this course.</essentials_plain><audience_plain>- Cyber Threat Intelligence Analyst
- Cyber Threat Hunter
- Cyber Threat Intelligence Associate/Researcher/Consultant
- Cybersecurity/Information Security Threat Intelligence Analyst
- Cyber Threat Intelligence Engineer/Specialist/Lead/Manager
- SOC Threat Intelligence Analyst
- Principal Cybercrime Threat Intelligence Analyst
- Threat Management Associate Director
- Project Manager/Director of Threat Intelligence</audience_plain><contents_plain>- Module 01: Introduction to Threat Intelligence
- Module 02: Cyber Threats and Attack Frameworks
- Module 03: Requirements, Planning, Direction, and Review
- Module 04: Data Collection and Processing
- Module 05: Data Analysis
- Module 06: Intelligence Reporting and Dissemination
- Module 07: Threat Hunting and Detection
- Module 08: Threat Intelligence in SOC Operations, Incident Response, and Risk Management</contents_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="DE" currency="EUR">2950.00</price><price country="SI" currency="EUR">2950.00</price><price country="UA" currency="EUR">2950.00</price><price country="AT" currency="EUR">2950.00</price><price country="NL" currency="EUR">2950.00</price><price country="PL" currency="EUR">2950.00</price><price country="IL" currency="ILS">10230.00</price><price country="GR" currency="EUR">2950.00</price><price country="MK" currency="EUR">2950.00</price><price country="HU" currency="EUR">2950.00</price><price country="US" currency="USD">2097.00</price><price country="CA" currency="CAD">2895.00</price><price country="CH" currency="CHF">2950.00</price></pricelist><miles/></course>