Certified Threat Intelligence Analyst (C|TIA)


Do you possess an analytical mind? Is critical thinking a part of who you are? Then you’ve come to the right place. A Certified Threat Intelligence Analyst (CTIA) acts as a force multiplier for organizations looking to reinforce their cyber defense security measures. Threat intelligence is akin to what conventional intelligence agencies across the world engage in to perceive and neutralize threats before any harm can be done. As a certified threat intelligence analyst, you’ll be at the vanguard of your organization’s cybersecurity ecosystem, keeping a 360 degree vigil on existing and foreseen/unforeseen threats.


The Certified Threat Intelligence Analyst (CTIA) program is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe. The aim is to help organizations hire qualified cyber intelligence trained professionals to identify and mitigate business risks by converting unknown internal and external threats into quantifiable threat entities and stop them in their tracks. Much like a ‘hunter-killer’ team, you’ll be deployed as a ‘Blue Team’ operative, tasked with threat identification, and asked to employ the tools at hand to thwart active and potential cyberattacks.

“Threat intelligence” (TI) is evidence-based knowledge — including context, mechanisms, indicators, implications and actionable advice — about an existing or emerging menace or hazard to IT or information assets. It can be used to inform decisions regarding the subject’s response to that menace or hazard.

– Gartner

Why Become a Certified Threat Intelligence Analyst?

  • Compliant with JTA listed under the ‘Analyze’ category of NICE 2.0

Our cyber threat intelligence training program employs a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. This makes it the ideal threat intelligence course for professionals to excel in the cybersecurity domain.

  • Increased employability, geometrically

The cyber threat intelligence training empowers you with the latest techniques and tools to detect, engage, and neutralize cyberattacks in real time. This puts you in a unique place where recruiters are just waiting to grab skilled professionals, like you!

  • Developed by global subject matter experts (SMEs)

EC-Council’s cyber intelligence analyst certification is developed using inputs and a vast pool of talent from global subject matter experts. A comprehensive cyber intelligence course, covering the A to Z of threat intelligence.

Learning Objectives of C|TIA Program

  1. Key issues in the InfoSec domain.
  2. Importance of threat intelligence in risk management, SIEM, and incident response.
  3. Various cyber threats, threat actors, and their objectives for cyberattacks.
  4. Fundamentals of threat intelligence (including threat intelligence types, life cycle, strategy, capabilities, maturity model, frameworks, etc.)
  5. Cyber kill chain methodology, Advanced Persistent Threat (APT), Indicators of Compromise (IoCs), and the pyramid of pain.
  6. Threat intelligence program steps (Requirements, Planning, Direction, Review).
  7. Types of data feeds, sources, and data collection methods.
  8. Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), and malware analysis.
  9. Bulk data collection and management (data processing, structuring, normalization, sampling, storing, and visualization).
  10. Data analysis types and techniques including Statistical Data Analysis, Structured Analysis of Competing Hypotheses (SACH), etc.
  11. Complete threat analysis process including threat modeling, fine-tuning, evaluation, runbook, and knowledge base creation.
  12. Different data analysis, threat modeling, and threat intelligence tools.
  13. Creating effective threat intelligence reports.
  14. Different threat intelligence sharing platforms, acts, and regulations for sharing strategic, tactical, operational, and technical intelligence.

Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract intelligence from data by implementing various advanced strategies. Such professional-level threat intelligence training programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.

CTIA is a method-driven threat intelligence program that uses a 360-degree approach, covering concepts from planning to building a threat intelligence report for pre-emptive threat detection and preventive measures. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.

Why Organizations Need A Threat Intelligence Team


Cyber threat intelligence includes reliable data collection from numerous sources, context relevant analysis, production of useful intelligence, and distributing the relevant information to stakeholders. Organizations can upgrade their defenses and create countermeasures by acquiring intelligence related to the Tactics, Techniques, and Procedures (TTPs) of potential threat actors. A threat intelligence analyst should have specialized skills and knowledge to competently understand the methodology and mindset of modern attackers and deploy the threat intelligence accordingly.

This threat intelligence training program will benefit professionals who are looking to build effective threat intelligence for their organization in order to combat modern-day cyberattacks and prevent future attacks.

C|TIA Stands Apart, Making a Difference!

Our threat intelligence certification takes a realistic and a forward-looking approach, addressing all the stages of the threat intelligence life cycle. The cyber intelligence analyst program provides unmatched knowledge and hands-on skill sets that are required for a career in threat intelligence, while enhancing your skills as a threat intelligence analyst and increasing your employability. It is desired by cybersecurity engineers, analysts, and IT professionals from around the world, and is revered by the top hiring companies.

At a Glance: The Market Demand for Threat Intelligence Analysts

With this kind of growth in the market, it is inevitable that there is a strong demand for threat intelligence professionals.

Take a look at the current jobs listed on leading job portals on cyber threat intelligence related job roles:

Comprehensive Cyber Threat Intelligence

Hands-on approach:

More than 40% of class-time is dedicated to the learning of practical skills, and this is achieved through EC-Council’s labs. The theory to practice ratio for CTIA is 60:40, providing students with a hands-on experience of the latest threat intelligence tools, techniques, methodologies, frameworks, scripts, etc. CTIA comes integrated with labs to emphasize the learning objectives.

The CTIA lab simulates a real-time environment which consists of the latest operating systems including Windows 10 and popular penetration testing platforms like Kali Linux for planning, collecting, analyzing, evaluating, and disseminating threat intelligence.

About the CourseAbout the ExamWho Is It For?At a GlanceBrochureTraining OptionsCourse OutlineTestimonialsBecome an ATC

About the Course

Course Duration:
Total Training: 3 Days (9:00 AM to 5:00 PM) or 24 hours
The C|TIA exam can be challenged post the completion of attending the complete official C|TIA course. Candidates that successfully pass the exam will receive their C|TIA certificate and membership privileges. Members are required to adhere to the policies of EC-Council’s Continuing Education Policy.

About the Exam

C|TIA allows cybersecurity professionals to demonstrate their mastery of the knowledge and skills required for threat intelligence

Number of Questions: 50
Duration: 2 hours
Availability: EC-Council Exam Portal
Test Format: Multiple Choice
Passing Score: 70%

Eligibility Criteria
To be eligible to challenge the C|TIA Exam, the candidate must either:

  • Attend official EC-Council C|TIA training through an accredited EC-Council Partner (Accredited Training Center, iWeek, or iLearn) (All candidates are required to pay the USD100 application fee unless your training fee already includes this) or
  • Submit an application showing a minimum of 2 years working experience in information security (All candidates are required to pay USD 100 as a non-refundable application fee)

For more information visit

Who Is It For?

  • Ethical Hackers
  • Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers
  • Threat Intelligence Analysts, Associates, Researchers, Consultants
  • Threat Hunters
  • SOC Professionals
  • Digital Forensic and Malware Analysts
  • Incident Response Team Members
  • Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience.
  • Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence.
  • Individuals interested in preventing cyber threats.

Click here

Training Options

iLearn (Self-Study)
This solution is an asynchronous, self-study environment which that delivers EC-Council’s sought-after CTIA, Threat Intelligence training courses in a streaming video format.

iWeek (Live Online)
This solution is a live, online, instructor-led training course, which means you can attend a the CTIA, Threat Intelligence training course with a live instructor from anywhere with an internet connection.

Master Class
This solution offers you the opportunity to learn the CTIA, Threat Intelligence program from world-class instructors, and the opportunity to collaborate with top Threat Intelligence professionals.

Training Partner (In Person)
This solution offers “in-person” training for Threat Intelligence so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.

Course Outline

  • Introduction to Threat Intelligence
  • Cyber Threats and Kill Chain Methodology
  • Requirements, Planning, Direction, and Review
  • Data Collection and Processing
  • Data Analysis
  • Intelligence Reporting and Dissemination

Train now, pay later with Affirm.

Available to US Residents Only.

Fill Out Our Inquiry Form to Learn More

Learning Resources

Divider spacer graphic


How to Build A Cyber Threat Inteligence Team

Nowadays, cyber threats are rapidly evolving because of the increased sophistication of attacks and motivations behind an attack. However, organizations can protect themselves from cyber threats by hiring expertise available outside of the organization…

How to use Artificial Intelligence for Threat Intelligence

Artificial intelligence in cybersecurity is an advancement in technology, especially where cyber threats are constantly becoming an issue. Going by the complexity and volume of cyberattacks, combining AI and cybersecurity will together change…

What is Cyber Threat Intelligence Data Collection and Acquistion?

The surge in cyber threats and attacks in the past few years calls for a comprehensive review of the network and the cybersecurity industry. According to a recent Microsoft survey, 22% …


Threat Intelligence and Proactive Defense with AI-ML

Cyber Threat Intelligence (CTI) has become a trending topic. It is being considered by many organizations to counter potential cyber threats. Traditional methodologies can block regular cyber threats, but today cybercriminals and hackers are using…

Threat Intelligence and Proactive Defense with AI-ML

Cyber Threat Intelligence (CTI) has become a trending topic. It is being considered by many organizations to counter potential cyber threats. Traditional methodologies can block regular cyber threats, but today cybercriminals and hackers are using…

Cybesrsecurity Education: the Best path to a Rewarding Career

To inhibit an inevitable cyberattack against a critical infrastructure requires highly skilled cyber-literate personnel. Therefore, it merely depends on the competency level and the potential that the education system holds…

Cyber talks

Creating a Threat Intelligence Function that Provides Measurable Value

Chris Williams is a cybersecurity professional with over 18 years at the federal and corporate level and has extensive threat intelligence, risk management, and investigative experience. Chris is currently the Senior Leader of Worldpay’s….

Creating a Threat Intelligence Function that Provides Measurable Value

Chris Williams is a cybersecurity professional with over 18 years at the federal and corporate level and has extensive threat intelligence, risk management, and investigative experience. Chris is currently the Senior Leader of Worldpay’s…

OSINT: The Real Threat Behind Open-Source Intelligence

Joe Anderson is an accomplished Information Security Engineer with 25 years’ experience in the IT industry. His wealth of knowledge encompasses the finance, manufacturing, healthcare, cloud, and managed services sectors…

Advisory Board

Divider spacer graphic

Dan Putz
Executive Director, IT Security & Threat Management
Vito Sardanopoli
Healthcare Industry Cybersecurity Task Force – Appointed Task Force Member, U.S. Department of Health and Human Services (HHS)
Israel Arroyo
Founder, President and CEO
Stealth Entry Cyber Security Solutions
Christopher Williams
VP, Cyber Threat Intelligence
Michael Britton
VP, Chief Information Security Officer (CISO),
Alliance Data
John Perea
North America Practice Leader | Director of Cybersecurity Services
Niels Groeneveld
Principal Threat Intelligence Analyst
Reza Rafati
Daniel Schatz
Chief Information Security Officer
Chris Murphy
Director, Cyber Security
Richard Beck
Director of Cyber
Bernice McCllum
Threat Intelligence Director
DarkMatter LLC
Mamdoh Alzhrani
VP- Cyber Security Intelligence
The National Commercial Bank – AlahliNCB
Rahil Karedia
Threat Intelligence & Threat Research Specialist
Network Intelligence (I) Pvt. Ltd
Fahad Alkhaldi
Cyber Intelligence & Forensic Specialist – Security Intelligence Management Group, Saudi Aramco
Vijay Kumar Verma
VP & Head, Cyber Security Operations Center (CSOC)
Colin van Niekerk
Head of Cyber Incident Response & Threat Intelligence
Absa Group
Sean Duca
Vice President, Regional Chief Security Officer – Asia Pacific & Japan
Palo Alto Networks
Andrew Scully
General Manager and CISO (DEBU)
Abbas Kudrati
Chief Cyber Security Officer
Dhananjaya Naronikar
Head of Cyber Security & Privacy
Kunal Sehgal
Former Managing Director for Global Resilience Federation, APAC,
Kunal Sehgal
Former Managing Director for Global Resilience Federation, APAC,


Quick, punchy updates on Cyber trends, news and links to free resources. Only via Telegram and Signal. Join the groups now!

Click Here

Click Here