Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Threat Intelligence Analyst
Description
Certified Threat Intelligence Analyst Introduction
In today’s digital age, the significance of becoming a Certified Threat Intelligence Analyst (CTIA) cannot be overstated. With cybersecurity threats constantly evolving, the need for skilled professionals to safeguard digital landscapes is more crucial than ever. This Certified Threat Intelligence Analyst course offers an in-depth journey into the world of cybersecurity, providing participants with the knowledge and skills required to excel as Threat Intelligence Analysts.
From the outset, you will dive into the methodologies and tools necessary for effectively gathering, analyzing, and assessing cybersecurity information.
Our program aims to develop proficient Certified Threat Intelligence Analysts who can leverage threat intelligence as a pivotal resource in identifying and mitigating network vulnerabilities and optimizing security resource allocation.
By becoming a CTIA, you will master the art of employing various intelligence tools and resources for proactive threat detection and reporting, thus playing a key role in strengthening your organization’s defense mechanisms against cyber threats. Embark with us on this essential path to certification and elevate your expertise in Threat Intelligence Analysis.
Certified Threat Intelligence Analysts Course and Exam Details
Upon completing this course, you will not only be proficient in documenting and evaluating cybersecurity threats but also poised to successfully pass the CTIA certification exam.
- It features 100 multiple-choice questions to be answered within a span of 2 hours.
- Achieving a minimum score of 70% grants you the esteemed CTIA certification.
- Please note that to maintain your certification, it is mandatory to pass the latest version of the exam every three years, in addition to earning and submitting 20 Continuing Education Units (CEUs) annually through your Mile2 account.
Suggested Prerequisites
- 12 months vulnerability testing
- CVA and CPEH
Audience
- Penetration Testers
- Microsoft Administrator
- Security Administrators
- Active Directory Administrators
- Anyone looking to learn more about security
Certified Threat Intelligence Analyst Outline
- Incident Handling Explained
- Incident Response Policy, Plan and Procedures.
- Incident Response Team Structure
- Incident Response Team Services
- Incident Response Recommendations
- Preparation
- Detection and Analysis
- Containment, Eradication and Recovery
- GRR Rapid Response
- Request Tracker
- Post Incident Activity
- Recommendations
- References
- Information Sharing
Hands On Cyber Range Live Labs
- Lab 1: Identifying Incident Triggers
- Lab 2: Drafting Incident Response Proceedures
- Lab 3: Planning for Dependencies
- Lab 4: Testing your plan
- Lab 5: Drafting Security Policies
- Lab 6: Practicing Attack Vectors
- Lab 7: Deploy GRR Client
- Lab 8: Create Request Tracker Workflow
- Lab 9: Lessons Learned
- Lab 10: Create a Checklist
- Lab 11: Draft Response Improvement Recommendations
- Lab 12: Sharing Agreements
$3500.00
|
5 Days Course |