Learning Objectives of C|TIA Program
Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract intelligence from data by implementing various advanced strategies. Such professional-level threat intelligence training programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. CTIA is a method-driven threat intelligence program that uses a 360-degree approach, covering concepts from planning to building a threat intelligence report for pre-emptive threat detection and preventive measures. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.- Key issues in the InfoSec domain.
- Importance of threat intelligence in risk management, SIEM, and incident response.
- Various cyber threats, threat actors, and their objectives for cyberattacks.
- Fundamentals of threat intelligence (including threat intelligence types, life cycle, strategy, capabilities, maturity model, frameworks, etc.)
- Cyber kill chain methodology, Advanced Persistent Threat (APT), Indicators of Compromise (IoCs), and the pyramid of pain.
- Threat intelligence program steps (Requirements, Planning, Direction, Review).
- Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), and malware analysis.
- Bulk data collection and management (data processing, structuring, normalization, sampling, storing, and visualization).
- Data analysis types and techniques including Statistical Data Analysis, Structured Analysis of Competing Hypotheses (SACH), etc.
- Complete threat analysis process including threat modeling, fine-tuning, evaluation, runbook, and knowledge base creation.
- Different data analysis, threat modeling, and threat intelligence tools.
- Creating effective threat intelligence reports.
- Different threat intelligence sharing platforms, acts, and regulations for sharing strategic, tactical, operational, and technical intelligence.
- Types of data feeds, sources, and data collection methods.