Certified Threat Intelligence Analyst (CTIA)

About the Course A program developed by threat intelligence experts from all over the world that is constantly updated to ensure that the students are exposed to the latest advances in the field of Threat Intelligence. Course Outline Who Should Attend

Learn at Your Own Pace

With the Self-Study option, you get:

  • Full access to course content
  • The freedom to study anytime, anywhere
  • No deadlines or pressure — you set your own pace

EC Council

Delivered in partnership with EC-Council, the world’s leading cybersecurity certification body—home of CEH, CHFI, and CCISO.

Course Summary

Choose Your Course Options
Price
806,00  + VAT

Trainee details

About the Course

A program developed by threat intelligence experts from all over the world that is constantly updated to ensure that the students are exposed to the latest advances in the field of Threat Intelligence.

Course Outline

  • Introduction to Threat Intelligence
  • Cyber Threats and Attack Frameworks
  • Requirements, Planning, Direction, and Review
  • Data Collection and Processing
  • Data Analysis
  • Intelligence Reporting and Dissemination
  • Threat Hunting and Detection
  • Threat Intelligence in SOC Operations, Incident Response, & Risk Management

Who Should Attend

  • Threat Intelligence
  • Analysts/Specialists/Professionals/Engineers/Examiners/Associates
  • Threat Hunters
  • Threat Intelligence Platform Specialists/Engineers/Professionals/Associates
  • Threat Intelligence Managers/Architects/Leads/Vulnerability Management Managers
  • SOC Threat Intelligence Analyst/Specialists/Professionals
  • Pen Testers/Ethical Hackers
  • Security Practitioners/Engineers/Analysts/Specialists/Architects/Managers
  • Digital Forensic and Malware Analysts
  • Incident Response Team Members
  • Any mid-level to high-level cybersecurity professionals with a minimum of 3 years of experience
  • Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence
  • Individuals interested in preventing cyber threats

    About the course:

    Need a Personalized Quote?Get in Touch!

    For bulk enrollments or special pricing options, request a customized quote.
    PRINCE2®, PRINCE2 Agile® and ITIL® are registered trade marks of AXELOS Limited, used under permission of AXELOS Limited. The Swirl logo™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

    PNRR. Finanțat de Uniunea Europeană – UrmătoareaGenerațieUE

    Conținutul acestui material nu reprezintă în mod obligatoriu poziția oficială a Uniunii Europene sau a Guvernului României
    Stay Up-to-Date!
    Stay updated with the latest news and insights by joining our newsletter! Sign up today to receive exclusive content, tips, and special offers tailored just for you.

    © 2025 · RQM CERT · All Rights Reserved
    This website is managed by RQM Certification SRL, VAT no. RO34221359, Reg. no. J35/591/2015, headquartered at Str. Marginii no. 4, Corp A, Ap. 6, Timișoara, Romania.