Certified Threat Intelligence Analyst

Enhance your cybersecurity skills with Mile2's Certified Threat Intelligence Analyst course, designed for security professionals to master threat detection and mitigation, ensuring robust organizational security.

Course Thumbnail

Essential Skills Gained

Checkmark

Understand threat intelligence sources and their effective use.

Checkmark

Implement policies and procedures to improve security posture.

Checkmark

Perform comprehensive threat analysis on information systems.

Checkmark

Accurately report findings and prepare for the C)TIA exam.

Format

  • Instructor-led
  • 3 days with lectures and hands-on labs.

Audience

  • Penetration Testers
  • Microsoft Administrators
  • Security Administrators
  • Active Directory Administrators

Description

Mile2’s CTIA (Certified Threat Intelligence Analyst) course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. Mile2’s CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them.  The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. Once complete, the student will be competent toward improving a company’s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk.  NICE FRAMEWORK WORK-ROLE ID:  AN-TWA-001 Key Course Information Live Class Duration: 5 Days CEUs: 40 Language: English Class Formats Available: Instructor Led Self-Study Live Virtual Training        

Calendar icon

Upcoming Course Dates

No upcoming dates. Please check back later.

Course Outline

Download PDF

Module 1: Incident Handling Explained

Module 2: Incident Response Policy, Plan and Procedures.

Module 3: Incident Response Team Structure

Module 4: Incident Response Team Services

Module 5: Incident Response Recommendations

Module 6: Preparation

Module 7: Detection and Analysis

Module 8: Containment, Eradication and Recovery

Module 9: GRR Rapid Response

Module 10: Request Tracker

Module 11: Post Incident Activity

Module 12: Recommendations

Module 13: References

Module 14: Information Sharing

Hands-On Cyber Range Live Labs

  1. Lab 1: Identifying Incident Triggers

  2. Lab 2: Drafting Incident Response Procedures

  3. Lab 3: Planning for Dependencies

  4. Lab 4: Testing your plan

  5. Lab 5: Drafting Security Policies

  6. Lab 6: Practicing Attack Vectors

  7. Lab 7: Deploy GRR Client

  8. Lab 8: Create Request Tracker Workflow

  9. Lab 9: Lessons Learned

  10. Lab 10: Create a Checklist

  11. Lab 11: Draft Response Improvement Recommendations

  12. Lab 12: Sharing Agreements

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.