EC council Threat Intelligence - CTIA
Reference : ECC ECSS-002Educational objectives
At the end of this training, the participants will be able to:
- Describe the security discipline of Threat Intelligence from a vendor-neutral perspective.
- Identify various Cyber Threats, Threat actors, and their objectives for cyberattacks.
- Master the process of Planning and Direction in Threat intelligence.
- Collect and process Data effectively for Threat intelligence.
- Explain the framework connections for Data analysis.
- Identify the Critical Issues plaguing the information security world.
- Recognize the importance of Threat Intelligence in Risk Management, security information and Event Management (SIEM), and Incident response.
Course programme
This training and credentialing program has been designed and developed to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialist-level program that teaches a structured approach for building effective threat intelligence.
Who is this course for?
Public
This course is designed for information security professionals who want to develop the skills and knowledge necessary to collect, analyze, and disseminate threat intelligence.
Prerequisites
Before starting this course, candidate should have experience of:
- Cybersecurity Essentials
- IT fundamentals