Certified Threat Intelligence Analyst

[et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”4.0.6″][et_pb_fullwidth_image src=”https://coecs.org/wp-content/uploads/2019/11/CTIA-Banner-low-scaled.jpg” _builder_version=”4.0.6″][/et_pb_fullwidth_image][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”4.0.6″][et_pb_fullwidth_header title=”Certified Threat Intelligence Analyst (C|TIA)” text_orientation=”center” _builder_version=”4.0.6″][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ specialty=”on” _builder_version=”4.0.6″ min_height=”1221px” custom_padding=”||0px|||”][et_pb_column type=”3_4″ specialty_columns=”3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.0.6″][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.0.6″][et_pb_text content_tablet=”” content_phone=”” content_last_edited=”on|desktop” _builder_version=”4.0.6″ custom_margin=”|-42px||||” custom_padding=”2px|||||”]

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence.

In the ever-changing threat landscape, C|TIA is an essential program for those who deal with cyber threats on a daily basis. Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.

C|TIA is a method-driven program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.

“Threat intelligence” (TI) is evidence-based knowledge — including context, mechanisms, indicators, implications and actionable advice — about an existing or emerging menace or hazard to IT or information assets. It can be used to inform decisions regarding the subject’s response to that menace or hazard. – Gartner

This program addresses all the stages involved in the Threat Intelligence Life Cycle. This attention to a realistic and futuristic approach makes C|TIA one of the most comprehensive threat intelligence certifications on the market today. This program provides the solid, professional knowledge that is required for a career in threat intelligence, and enhances your skills as a Threat Intelligence Analyst, increasing your employability. It is desired by most cybersecurity engineers, analysts, and professions from around the world and is respected by hiring authorities.

The Purpose of C|TIA is

    • To enable individuals and organizations with the ability to prepare and run a threat intelligence program that allows ‘evidence-based knowledge’ and provides ‘actionable advice’ about ‘existing and unknown threats’.
    • To ensure that organizations have predictive capabilities rather than just proactive measures beyond active defense mechanism.
    • To empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program.
    • To differentiate threat intelligence professionals from other information security professionals.
    • For individuals: To provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability.

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://coecs.org/wp-content/uploads/2020/03/CTIA-2020-Price-Mockup-72-min.jpg” _builder_version=”4.3.2″ hover_enabled=”0″][/et_pb_image][et_pb_text _builder_version=”4.0.6″ header_font=”|||on|||||” header_text_align=”center” custom_padding=”||0px||false|false” header_text_shadow_style=”preset1″]

The Trainer

[/et_pb_text][et_pb_team_member name=”Farooq Wahab Nayer” position=”Advisory Board C|TIA – EC Council” image_url=”https://coecs.org/wp-content/uploads/2019/11/Farooq-Wahab.jpg” twitter_url=”https://twitter.com/farooqwahab” linkedin_url=”https://www.linkedin.com/in/farooqwahab/” _builder_version=”4.0.6″ custom_margin=”-30px|||-8px||” link_option_url_new_window=”on”]

Farooq is the CISO of the largest research and education network in Canada, The CISO role at ORION has been born out of a collaborative initiative supported by ORION and Fourteen of their constituent Universities and fourteen Colleges in Ontario.  The role provides this community with strategic security thought leadership, while bringing them tangible working programs and tools for compliance, risk management, a governance framework as well as delivery of broader shared security services.

[/et_pb_team_member][et_pb_button button_url=”https://coecs.org/farooq-wahab-naiyer/” url_new_window=”on” button_text=”Trainer Details” button_alignment=”center” _builder_version=”4.0.6″][/et_pb_button][/et_pb_column][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.0.6″ custom_padding=”||0px|||”][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.0.6″ custom_padding=”||0px|||”][et_pb_column type=”2_5″ _builder_version=”4.0.6″][et_pb_text _builder_version=”4.0.6″][/et_pb_text][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.0.6″][et_pb_image src=”https://coecs.org/wp-content/uploads/2019/11/threat-intelligence-banner-02.png” _builder_version=”4.0.6″][/et_pb_image][et_pb_text _builder_version=”4.0.6″]

Cyber threat intelligence includes reliable data collection from numerous sources, context relevant analysis, production of useful intelligence, and distributing the relevant information to stakeholders. Organizations can upgrade their defenses and create countermeasures by acquiring intelligence related to the Tactics, Techniques, and Procedures (TTPs) of potential threat actors. A threat intelligence analyst should have specialized skills and knowledge to competently understand the methodology and mindset of modern attackers and deploy the threat intelligence accordingly.

This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”4.0.6″][et_pb_fullwidth_header title=”Learning Objectives” _builder_version=”4.0.6″ title_font=”|700|||||||” title_text_align=”center”][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.0.6″ custom_padding=”0px||0px|||”][et_pb_row _builder_version=”4.0.6″][et_pb_column type=”4_4″ _builder_version=”4.0.6″][et_pb_text _builder_version=”4.0.6″ min_height=”1006px” custom_margin=”-26px|||||”]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”4.0.6″][et_pb_fullwidth_image src=”https://coecs.org/wp-content/uploads/2019/11/CTIA_B.png” _builder_version=”4.0.6″ custom_margin=”-9px|||||” custom_padding=”||0px|||”][/et_pb_fullwidth_image][et_pb_fullwidth_header title=”With this kind of growth in the market, it is inevitable that there is a strong demand for TI professionals.” _builder_version=”4.0.6″ title_font=”|700|||||||” title_text_align=”center”][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.0.6″ background_color=”#d6d6d6″ min_height=”1383px” custom_padding=”1px||0px|||”][et_pb_row _builder_version=”4.0.6″ custom_padding=”||0px|||”][et_pb_column type=”4_4″ _builder_version=”4.0.6″][et_pb_text _builder_version=”4.0.6″]

Why Become a Certified Threat Intelligence Analyst?

C|TIA is built in complaince with JTA listed under ‘Analyze’ category of NICE 2.0
The program is based on a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence.

The Credential Helps Increase Employability
This program provides the necessary knowledge to start a career/ enhance your skills as a Threat Intelligence Analyst, thereby increasing your employability

The Training Program Is Developed by SMEs
It is designed and developed by subject matter experts from all across the globe to ensure the content matches what is needed by the job market.

It Follows a Detect, Respond, Defeat Methodology
It provides the best practices to detect, respond, and defeat focused threats which helps improve the organizational security posture

C|TIA Is a Holistic Approach to Threat Intelligence
It is a method-driven program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence.

It Helps Professionals Combat Cyber Threats
C|TIA is a highly essential program for those who deal with cyber threats.

[/et_pb_text][et_pb_divider _builder_version=”4.0.6″][/et_pb_divider][/et_pb_column][/et_pb_row][et_pb_row column_structure=”2_3,1_3″ _builder_version=”4.0.6″ custom_padding=”||0px|||”][et_pb_column type=”2_3″ _builder_version=”4.0.6″][et_pb_text _builder_version=”4.0.6″]

A Holistic Approach to Cyber Threat Intelligence

The program was based on a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. This program differentiates threat intelligence professionals from other information security professionals. It is a highly interactive, comprehensive, standards-based, intensive 4-day training program that teaches information security professionals to build professional threat intelligence.

[/et_pb_text][et_pb_tabs _builder_version=”4.3.2″ hover_enabled=”0″][et_pb_tab title=”About the Course” _builder_version=”4.0.6″]

Course Duration:
Total Training: 4 Days (9:00 AM to 5:00 PM) or 32 hours

Certification:
The C|TIA exam can be challenged post the completion of attending the complete official C|TIA course. Candidates that successfully pass the exam will receive their C|TIA certificate and membership privileges. Members are required to adhere to the policies of EC-Council’s Continuing Education Policy.

[/et_pb_tab][et_pb_tab title=”Course Outline” _builder_version=”4.0.6″]

  • Introduction to Threat Intelligence
  • Cyber Threats and Kill Chain Methodology
  • Requirements, Planning, Direction, and Review
  • Data Collection and Processing
  • Data Analysis
  • Intelligence Reporting and Dissemination

[/et_pb_tab][et_pb_tab title=”Who Is It For?” _builder_version=”4.0.6″]

  • Ethical Hackers
  • Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers
  • Threat Intelligence Analysts, Associates, Researchers, Consultants
  • Threat Hunters
  • SOC Professionals
  • Digital Forensic and Malware Analysts
  • Incident Response Team Members
  • Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience.
  • Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence.
  • Individuals interested in preventing cyber threats.

[/et_pb_tab][et_pb_tab title=”What is Included?” _builder_version=”4.3.2″ hover_enabled=”0″]

Included in the training package are:

  • EC-Council certified C|TIA instructor led in-class training
  • Original EC-Council e-courseware
  • Access to EC-Council iLabs
  • EC-Council C|TIA Exam Voucher
  • EC-Council Completion Certificate
  • 32 Continuing Education Credit Hours

[/et_pb_tab][et_pb_tab title=”About the Exam” _builder_version=”4.0.6″]

C|TIA allows cybersecurity professionals to demonstrate their mastery of the knowledge and skills required for threat intelligence

Number of Questions: 50
Duration: 2 hours
Availability: EC-Council Exam Portal
Test Format: Multiple Choice
Passing Score: 70%

Eligibility Criteria
To be eligible to challenge the C|TIA Exam, the candidate must attend official EC-Council C|TIA training through an accredited EC-Council Partner (Accredited Training Center, iWeek, or iLearn)

[/et_pb_tab][/et_pb_tabs][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.0.6″][et_pb_cta title=”Course Brochure” button_url=”https://coecs.org/wp-content/uploads/2019/11/CTIA-Brochure.pdf” url_new_window=”on” button_text=”Download PDF” _builder_version=”4.0.6″ min_height=”190px” custom_margin=”||6px|||”][/et_pb_cta][et_pb_cta title=”Course Outline” button_url=”https://coecs.org/wp-content/uploads/2019/11/ctia-course-outline.pdf” url_new_window=”on” button_text=”Download PDF” _builder_version=”4.0.6″][/et_pb_cta][et_pb_image src=”https://coecs.org/wp-content/uploads/2019/11/CTIA-Battle-Card-1.jpg” show_in_lightbox=”on” _builder_version=”4.0.6″ custom_margin=”-27px|||||”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section]