Facebook
Instagram
Twitter
YouTube
CRMNUGGETS
Home
ABOUT US
RCCG SOD
BUSINESS ANALYSIS
CRM
free tech courses
PRIVACY
TERMS
HIRE ME
Home
COURSE REGISTRATION
Cyber Security
Certified Threat Intelligence Analyst
Certified Threat Intelligence Analyst
Curriculum
10 Sections
42 Lessons
10 Weeks
Expand all sections
Collapse all sections
Understanding Threat Intelligence (TI) — Concepts and Importance
This section talks about Understanding Threat Intelligence (TI) — Concepts and Importance
6
1.1
Understanding Threat Intelligence (TI) — Concepts and Importance
1.2
The Role of Threat Intelligence in Cybersecurity
1.3
Types of Cyber Threat Intelligence: Strategic, Tactical, Operational, Technical
1.4
The Threat Intelligence Lifecycle: Planning, Collection, Processing, Analysis, Dissemination, Feedback
1.5
Benefits and Challenges of Implementing Threat Intelligence
1.6
Section Quiz
10 Minutes
10 Questions
Cyber Threats and Attack Vectors
This section talks about Cyber Threats and Attack Vectors
6
2.1
Overview of Modern Cyber Threats
2.2
Understanding Threat Actors (Hacktivists, Nation-States, Cybercriminals, Insiders)
2.3
Common Attack Vectors (Phishing, Ransomware, Zero-day, Supply Chain)
2.4
MITRE ATT&CK Framework: Mapping Threats and Tactics
2.5
Case Studies of Major Global Cyber Incidents
2.6
Section Quiz
10 Minutes
10 Questions
Threat Intelligence Planning and Direction
This section talks about Threat Intelligence Planning and Direction
5
3.1
Setting Intelligence Requirements (IRs)
3.2
Defining Key Performance Indicators (KPIs) for CTI Programs
3.3
Legal and Ethical Considerations in Threat Intelligence Collection
3.4
Developing a Threat Intelligence Strategy
3.5
Section Quiz
10 Minutes
10 Questions
Data Collection and Threat Intelligence Sources
This section talks about Data Collection and Threat Intelligence Sources
9
4.1
Open Source Intelligence (OSINT)
4.2
Human Intelligence
4.3
Technical Intelligence (TECHINT)
4.4
Dark Web
4.5
Tools for Threat Data Collection (Shodan, Maltego, SpiderFoot, Censys)
4.6
Data Validation and Verification Techniques
4.7
Leveraging Threat Feeds, Forums, and Intelligence
4.8
Sharing Platforms (ISACs, MISP, TAXII/STIX)
4.9
Section Quiz
10 Minutes
10 Questions
Data Processing and Analysis
This section talks about Data Processing and Analysis
5
5.1
Data Normalization and Correlation Threat Data Enrichment
5.2
Indicators of Compromise (IOCs) and Indicators of Attack (IOAs)
5.3
Attribution Techniques — Identifying Threat Actors Behavioral and Predictive Analysis
5.4
Machine Learning and AI in Threat Analysis
5.5
Section Quiz
10 Minutes
10 Questions
Threat Intelligence Tools and Platforms
This section talks about Threat Intelligence Tools and Platforms
4
6.1
Overview of Threat Intelligence Platforms (TIPs)
6.2
Integration with SIEM and SOAR systems Hands-on with Tools: MISP (Malware Information Sharing Platform) ThreatConnect Recorded Future Anomali ThreatStream
6.3
Automating Threat Data Collection and Analysis
6.4
Section Quiz
10 Minutes
10 Questions
Threat Intelligence Reporting and Dissemination
This section covers Threat Intelligence Reporting and Dissemination
5
7.1
Visualizing Threat Data (Dashboards and Graphs)
7.2
Dissemination Channels and Stakeholder Communication
7.3
Using Intelligence for Decision-Making and Risk Reduction
7.4
Creating Executive Summaries and Actionable Reports
7.5
Section Quiz
10 Minutes
10 Questions
Building and Maturing a Threat Intelligence Program
This section explains Building and Maturing a Threat Intelligence Program
5
8.1
Frameworks for CTI Maturity (Gartner, NIST, SANS)
8.2
Metrics for Evaluating CTI Effectiveness
8.3
Integrating CTI into Incident Response and SOC Operations
8.4
Threat Hunting Using Intelligence Data
8.5
Continuous Improvement of CTI Processes
Legal, Ethical & Compliance Aspects
This section talks about Legal, Ethical & Compliance Aspects
4
9.1
Legal Regulations Affecting Threat Intelligence (GDPR, HIPAA, NIS2, etc.)
9.2
Ethical Boundaries in Threat Data Collection
9.3
Data Sharing Agreements and Privacy Safeguards
9.4
Cross-border Threat Intelligence Collaboration
Final Exam
This is the final Exam
1
10.1
Final Exam
45 Minutes
40 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Modal title
Main Content