Certified Threat Intelligence Analyst

Identify and mitigate business risks by converting unknown internal and external threats into quantifiable threat entities and stop them in their tracks.

<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script><script> hbspt.forms.create({ region: "na1", portalId: "8057651", formId: "6a3ff7a7-c223-47d4-9399-1559c6940d97" });</script>
Live instructor-led
Onsite or Virtual / Public or Private Class
3 days (Live Training) + Examination

Why become a Certified Threat Intelligence Analyst:

Compliant with JTA listed under 'Analyze' category of NICE 2.0
Increased employability
Developed by global Subject Matter Experts (SME)

How to build a career in Cyber Threat Intelligence?

Cyberattacks have become more complex and expensive than ever before, creating a growing need for skilled cyber threat intelligence professionals who can analyze security threats and present information in a manner that enables quick action and resolution. 


Watch the video to learn five steps to building a career in cyber threat intelligence.  

Prerequisites:

Certified Threat Intelligence Analyst requires a minimum of 2 years of experience and is suitable for mid-level to high-level cybersecurity professionals. It is also for information security professionals who want to enrich their skills and knowledge in the field of cyber threat intelligence.

Business Outcomes:

  • Enable individuals and organisations with the ability to prepare and run a threat intelligence program that allows evidence-based knowledge and provides actionable advice about existing and unknown threats
  • Ensure that organisations have predictive capabilities rather than just proactive measures beyond active defence mechanism
  • Empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program
  • Differentiate threat intelligence professionals from other information security professionals
  • Provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability

Curriculum Outline:

  • Introduction to Threat Intelligence
  • Cyber Threats and Kill Chain Methodology
  • Requirements, Planning, Direction, and Review
  • Data Collection and Processing
  • Data Analysis
  • Intelligence Reporting and Dissemination

OUR EXPERT INSTRUCTORS

Col. Rajesh Dubey

General Manager at ITI Ltd

Col. Rajesh Dubey

General Manager at ITI Ltd

Dr Athirah Mohd Ramly

Lecturer at Sunway University, Department of Computing and Information Systems

Dr Athirah Mohd Ramly

Lecturer at Sunway University, Department of Computing and Information Systems

Prefer personalised consultation on corporate training?

<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script><script> hbspt.forms.create({ region: "na1", portalId: "8057651", formId: "6a3ff7a7-c223-47d4-9399-1559c6940d97" });</script>

WHAT LEARNERS SAY