Skip to main content

EC-Council Certified Threat Intelligence Analyst (C|TIA)

Code: 2029 Category: Tag:

Certified Threat Intelligence Analyst (C|TIA) is a new training program designed and developed to help organizations identify and mitigate various business risks by converting unknown internal and external threats into known threats. In this method-driven course, you will learn a holistic approach covering vast concepts concerning organizational threat intelligence that are highly essential while building effective threat intelligence that can secure organizations from future threats or attacks.

C|TIA Training Delivery Methods



C|TIA Training Course Benefits

Introduction to Threat Intelligence

Explore Cyber threats and Kill Chain Methodology

Understand requirements, planning, direction, and review

Reporting and dissemination of intelligence

Continue learning and face new challenges with after-course one-on-one instructor coaching

C|TIA Training Instructor-Led Course
Important Course and Certification Information


3-5 years of experience as a cybersecurity professional

Exam Information

50 Question, Multiple Choice, 2 Hour Duration, 70% Passing Score
Exam Voucher included with the course
Module 01: Introduction to Threat Intelligence
Module 02: Cyber Threats and Kill Chain Methodology
Module 03: Requirements, Planning, Direction, and Review
Module 04: Data Collection and Processing
Module 05: Data Analysis Overview
Module 06: Intelligence Reporting and Dissemination

Request Quotes

Register now

Please type the characters This helps us prevent spam, thank you.

PowerApps and Power Automate Training

Implementing Cisco Enterprise Wireless Networks (ENWLSI)

BOW310 – SAP BusinessObjects Web Intelligence Training: Report Design I

Deep Learning on AWS

Designing and Implementing a Microsoft Azure AI Solution Training (AI-102)

Excel Data Analysis Course

WebSphere Application Server V9 Administration (WA590G)

Effective Software Testing Strategies

Designing Cisco Enterprise Networks (ENSLD v1.0) Training

Social Engineering Training: Deceptions and Defenses