
EC-Council
EC-Council Certified Threat Intelligence Analyst v1

CTIA Course Overview
Certified Threat Intelligence Analyst (CTIA) from EC-Council is a credentialing certification and training program. This highly valued certification has been exclusively devised in collaboration with threat intelligence and cybersecurity experts worldwide to empower organizations effectively to identify and mitigate security risks with extensive processing and analysis of available threat information. The CTIA is a specialist level training and certification that demonstrates security professionals the structured approach to acquiring threat intelligence. The CTIA certified candidates attain a competitive edge over other information security professionals. This threat intelligence certification course delivers standards-based, intensive practical skills to the most essentially required threat intelligence across information security.
Why take CTIA?
This program addresses all the stages involved in the Threat Intelligence Life Cycle. This attention to a realistic and futuristic approach makes C|TIA one of the most comprehensive threat intelligence certifications on the market today. This program provides the solid, professional knowledge that is required for a career in threat intelligence, and enhances your skills as a Threat Intelligence Analyst, increasing your employability. It is desired by most cybersecurity engineers, analysts, and professions from around the world and is respected by hiring authorities.
In the ever-changing threat landscape, C|TIA is an essential program for those who deal with cyber threats on a daily basis. Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.
The CTIA certification training course from InfoSec Train helps you acquire a far-reaching understanding of:
- Threat intelligence and core concepts
- Various types of cyber threats
- Kill chain methodology
- Requirements of threat intelligence
- How to planning, direction, and review
- Collecting data and processing
- Data analysis
- Creating intelligence reports and disseminating
C|TIA is a method-driven program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.
When you become CTIA Certified, you will be:
- Compliant with JTA listed under the ‘Analyze’ category of NICE 2.0
Our cyber threat intelligence training program employs a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. This makes it the ideal threat intelligence course for professionals to excel in the cybersecurity domain.
- Increased employability, geometrically
The cyber threat intelligence training empowers you with the latest techniques and tools to detect, engage, and neutralize cyberattacks in real time. This puts you in a unique place where recruiters are just waiting to grab skilled professionals, like you!
- Developed by global subject matter experts (SMEs)
EC-Council’s cyber intelligence analyst certification is developed using inputs and a vast pool of talent from global subject matter experts. A comprehensive cyber intelligence course, covering the A to Z of threat intelligence.

The Purpose of the CSA Certification Course?
To enable individuals and organizations with the ability to prepare and run a threat intelligence program that allows ‘evidence-based knowledge’ and provides ‘actionable advice’ about ‘existing and unknown threats’. To empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program.
To differentiate threat intelligence professionals from other information security professionals. For individuals: To provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability. For more information on C|TIA application process, please click here
Ethical Hacking is often referred to as the process of penetrating one’s own computer/s or computers to which one has official permission to do so as to determine if vulnerabilities exist and to undertake preventive, corrective, and protective countermeasures before an actual compromise to the system takes place.
Target Audience
Course Pre-Requisite
There are no hard set prerequisites for course attendance, however in order to apply to take the exam you must be able to show a minimum of 3 years working experience in information security or software design.
Learning Objectives for CSA v1 Training Course
This Certified Threat Intelligence Analyst training and certification aim to explain expertly:
- Primary issues threatening the information security world
- Role of threat intelligence
- Implementing threat intelligence in risk management, incident response, and SIEM
- Cyber threats and threat factors
- Objectives of diverse cybersecurity attacks
- Basics of threat intelligence including types, capabilities, strategy, lifecycle, maturity model, and frameworks
- Implementing the cyber kill chain methodology
- Advanced Persistent Threat (APT) lifecycle
- Tactics, Techniques, and Procedures (TTPs)
- Indicators of Compromise (IoCs) and the pyramid of pain
- Steps to Planning a threat intelligence program including taking requirements, planning, directing, and review
- Types of data feeds and methods to collect data
- Threat intelligence data collection by using Cyber Counterintelligence (CCI), Open Source Intelligence (OSINT), Human Intelligence (HUMINT), and Indicators of Compromise (IOS)
- Bulk data collection, data structuring, processing, normalizing, sampling, storing, and creating visualizations
- Types of data analysis techniques such as Statistical Data Analysis, Analysis Structured Analysis of Competing Hypotheses (SACH), and of Competing Hypotheses (ACH)
- Threat analysis process including threat modeling, evaluation, fine-tuning, creating a knowledge base and runbook
- Threat intelligence dissemination, dissemination preferences
- Intelligence collaboration and Malware analysis
- Types of TI exchange and threat intelligence sharing formats
- Tools for threat intelligence, threat modeling, data analysis
- Disseminating threat intelligence and sharing protocols, dissemination preferences, sharing rules and models, intelligence collaboration
- TI exchange architecture and types, sharing relationships
- Threat intelligence standards and formats for sharing
- Threat intelligence reporting
- Platforms and regulations to share operational, strategic, tactical, and technical intelligence
Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialist-level program that teaches a structured approach for building effective threat intelligence.
The program was based on a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. This program differentiates threat intelligence professionals from other information security professionals. It is a highly interactive, comprehensive, standards-based, intensive 3-day training program that teaches information security professionals to build professional threat intelligence.
More than 40 percent of class time is dedicated to the learning of practical skills, and this is achieved through EC-Council labs. Theory to practice ratio for C|TIA program is 60:40, providing students with a hands-on experience of the latest threat intelligence tools, techniques, methodologies, frameworks, scripts, etc. C|TIA comes integrated with labs to emphasize the learning objectives.
The C|TIA lab environment consists of the latest operating systems including Windows 10 and Kali Linux for planning, collecting, analyzing, evaluating, and disseminating threat intelligence.
This course covers:
1. Introduction to Threat Intelligence
- Understanding Intelligence
- Understanding Cyber Threat Intelligence
- Overview of Threat Intelligence Lifecycle and Frameworks
2. Cyber Threats and Kill Chain Methodology
- Understanding Cyber Threats
- Understanding Advanced Persistent Threats (APTs)
- Understanding Cyber Kill Chain
- Understanding Indicators of Compromise (IoCs)
3. Requirements, Planning, Direction and Review
- Understanding Organization's Current Threat Landscape
- Understanding Requirements Analysis
- Planning Threat Intelligence Program
- Establishing Management Support
- Building a Threat Intelligence Team
- Overview of Threat Intelligence Sharing
- Reviewing threat Intelligence Program
4. Data Collection and Processing
- Overview of Threat Intelligence Data Collection
- Overview of Threat Intelligence Collection Management
- Overview of Threat Intelligence Feeds and Sources
- Understanding Threat Intelligence Data Collection and Acquisition
- Understanding Bulk Data Collection
- Understanding Data Processing and Exploitation
5. Data Analysis
- Overview of Data Analysis
- Understanding Data Analysis Techniques
- Overview of Threat Analysis
- Understanding Threat Analysis Process
- Overview of Fine-Tuning Threat Analysis
- Understanding Threat Intelligence Evaluation
- Creating Runbooks and Knowledge Base
- Overview of Threat Intelligence Tools
6. Intelligence Reporting and Dissemination
- Overview of Threat Intelligence Reports
- Introduction to Dissemination
- Participating in Sharing relationships
- Overview of Sharing Threat Intelligence
- Overview of Delivery Mechanisms
- Understanding Threat Intelligence Sharing Platforms
- Overview of Intelligence Sharing Acts and Regulations
- Overview of Threat Intelligence Integration
Exam Codes | 312-85 (ECC EXAM) |
Number of Questions | 50 questions per exam |
Type of Questions | Multiple choice |
Length of Test | 2 Hours / 120 Minutes |
Testing Provider | ECC EXAM PORTAL |
Passing Score | 70% |

EC-Council Certified Chief Information Security Officer v3

EC-Council Certified Penetration Testing Professional v1

EC-Council Computer Hacking Forensic Investigator v9
Course Highlights
Contact
- Unit 15B Penthouse Atherton Place, Tomas Morato, Corner Don A. Roces Ave, Quezon City, 1103 Metro Manila
- +(632) 7905 8718
- sales@teched.com.ph
Brochures
Testimonials
Training at TechED has been amazing. The instructor has provided us with so much in depth knowledge regarding the course including course material which are detailed and a lot of iLabs for hands on experience. Would recommend for anyone looking to study.
Francis C.
Network Security Administrator, Manufacturing Sector
The instructor is exceptionally knowledgeable and provided valuable additional content and labs.
Erick Z.
Cybersecurity Director, BPO Industry
Considering the difficult times we live in with COVID-19, the online training delivery as well as the staff were superb.
The course really keyed in all the topics of the exam. The material slides, documentation, labs was well written and presented. The instructor really knew his stuff and you could tell he was passionate about the subject.
Christian L.
IT Manager, Health Sector
TechED's training was excellent. The trainer was able to explain all the material and extra on top of that which I think will help me with future training and in my work environment. I would highly recommend it to anyone wishing to further their knowledge in a quick and easy way.
Mike S.
US Military
The Cybersecurity Trainings and Instructor provided by TechED are a must for anyone working in the field. It provides a wealth of useful information that might be useful when you get back to work.
Richard J.
Cybersecurity Specialist, US DOD Contractor