top of page
Certified Cyber Threat Intelligence Analyst

In a world where cyber threats are becoming increasingly sophisticated, equipping yourself with the skills to defend against potential attacks is paramount. Our Certified Cyber Threat Intelligence Analyst training is designed to empower individuals and organizations with the knowledge and tools to navigate the complex landscape of cybersecurity threats effectively.

  1. In-Depth Understanding: Gain profound insights into security threats, attack methodologies, vulnerabilities, and the behavior of cyber attackers. Acquire knowledge of the MITRE ATT&CK Framework to identify attacker techniques, tactics, and procedures, enabling you to investigate indicators of compromise and respond promptly.
  2. Threat Intelligence Integration: Learn the essentials of Threat Intelligence and how to seamlessly integrate it with critical technologies such as SIEM, SOAR, EDR, and other SOC technologies. This integration reduces the Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR), enhancing your organization's cyber resilience.
  3. Setting Up a Threat Intelligence Framework: Acquire the skills to establish a robust Threat Intelligence Framework and platform for your organization. Learn to consume data from community and commercial feeds, providing a comprehensive understanding of attacks and fortifying defenses against future threats.
  4. Malware Information Sharing: Understand the intricacies of setting up a Malware Information Sharing Platform (MISP). Gain practical insights into configuring and integrating MISP with incident response processes using HIVE, automating them into a cohesive workflow.

 

Training Duration: 5 Days

  • SBL-Khas Claimable
  • Certificate Of Completion Available
  • Private In-House Class Available
  • ILT & VILT Class Available

 

Download Course Outline

CCTIA: Certified Cyber Threat Intelligence Analyst

RM5,500.00Price
  • The attendees of this training will learn in-depth about security threats, attacks, vulnerabilities, and attacker behavior. They will also learn about the MITRE ATT&CK Framework and how to identify attacker techniques, tactics, and procedures in order to investigate indicators of compromise and respond to eliminate the attack or incident. The training will also cover the concepts of Threat Intelligence and how to integrate it with various technologies such as SIEM, SOAR, EDR, and other SOC technologies to reduce the time it takes to detect and respond to attacks. Attendees will also learn how to set up a Threat Intelligence Framework and platform for their organization and consume community and commercial feeds to understand attacks and defend their organization from future attacks. Additionally, attendees will learn how to set up a Malware Information Sharing Platform and integrate it with incident response processes using HIVE and automate them as a single workflow.

     

    Threat Intelligence enables Businesses to provide the best possible defense against the most probable threats. This course introduces attendees with the basics concepts of Threat Intelligence and take them thru the entire process of setting up a Threat Intel Platform using MISP to consume all the intelligence from around 80+ global community feeds and also enables the attendees to share intelligence on malwares and attacks back to the community.

Private in-house class enquiry

Thanks for submitting!

bottom of page