Threat Intelligence Analysis (C|TIA Prep)

Paths

Threat Intelligence Analysis (C|TIA Prep)

Authors: Christopher Rees, Ricardo Reimao

Pluralsight is not an official partner or accredited training center of EC-Council®. This series can be used to prepare for the EC-Council® C|TIA® (Certified Threat Intelligence... Read more

What you will learn

  • The threat intelligence life cycle and frameworks
  • How to plan out and employ a threat intelligence program
  • How to prepare an effective threat intelligence team
  • How to incorporate threat intelligence collection management
  • Threat intelligence data collection and acquisition
  • How to fine tune threat analysis
  • How to create runbooks and a knowledge base
  • How to integrate threat intelligence into security operations

Pre-requisites

There are no prerequisites but 2 years of hands-on working experience within information security is recommended.

Threat Intelligence Analysis

In this section, you will learn all about the threat intelligence life cycle, threat intelligence types, & frameworks, and how to leverage threat intelligence to enhance your organization's ability to defend against potential malicious activity. First, you will learn about cyber threats & threat actors, and their intent to cause potential harm to an environment using a variety of tactics, techniques, and procedures (TTPs). Next, you'll learn about data collection methods and how to produce actionable output from the information acquired. Then, you will delve into threat analysis, the process, and how to fine-tune the analysis. By the end, you'll be able to plan and build an effective threat intelligence plan that can be leveraged to detect, mitigate, and prevent future cyber-attacks against your enterprise.

Pluralsight is not an official partner or accredited training center of EC-Council®.

Introduction to Threat Intelligence

by Christopher Rees

Oct 8, 2019 / 1h 9m

1h 9m

Start Course
Description

Threat intelligence is a critical component of cybersecurity and a tool that many companies don’t fully utilize. In this course, Introduction to Threat Intelligence, you will understand how critical threat intelligence analysis is to a company's overall security posture. Additionally you will learn how threat intelligence analysts provide vitally important data that enables defenders, managers, and executives to make timely and accurate decisions.

First, you will understand what threat intelligence is, how it enhances all facets of a company's cyber-security program, and how it can be a major differentiator in today's hyper-competitive global marketplace. Next, you will learn the phases of the intelligence life cycle and how each phase is used to provide intelligence to the teams and leaders that need it most. Finally, you will learn about the various frameworks typically used and how they help guide decisions, shorten the information aggregation and dissemination timelines, and ultimately help organizations defend their networks from attack.

When you are finished with this course, you will have a good understanding of what threat intelligence is, why every company needs skilled, competent analysts and who could (and should) be consuming the information.

Table of contents
  1. Course Overview
  2. Defining Threat Intelligence Analysis
  3. Understanding Intelligence
  4. Understanding Cyber Threat Intelligence
  5. Evaluating Threat Intelligence Lifecycle and Frameworks

Threat Intelligence: Cyber Threats and Kill Chain Methodology

by Ricardo Reimao

Nov 16, 2020 / 2h 26m

2h 26m

Start Course
Description

As a cyber threat intelligence analyst, you must understand the main threats and how attackers do their work. By understanding the hacker mindset and the procedures that malicious attackers use, you will be able to better protect your company. In this course, Threat Intelligence: Cyber Threats and Kill Chain Methodology, you’ll learn about the main cybersecurity threat vectors/actors as well as how the attackers perform their work. First, you’ll explore the main cyber security threats, including a deep dive into the most current threat vectors and threat actors. Next, you’ll discover the main indicators of compromise, so then you can easily spot early signs of intrusion in your organization. Finally, you’ll learn about Advanced Persistent Threats (APT) groups as well as the kill chain methodology that they use. When you’re finished with this course, you’ll have the skills and knowledge of the main threat vectors and threat actors needed to better protect your company. This course covers the second chapter of the Cyber Threat Intelligence Analyst (C|TIA or CTIA) Certification.

Table of contents
  1. Course Overview
  2. Threat Vectors and Threat Actors
  3. Indicators of Compromise (IoCs)
  4. The Kill Chain Methodology
  5. Advanced Persistent Threats (APTs)

Threat Intelligence: Requirements, Planning, Direction, and Review

by Ricardo Reimao

Jan 29, 2021 / 2h 22m

2h 22m

Start Course
Description

Approaching cybersecurity with a threat intelligence mindset is an effective way of reducing the cyber risk of a company. By analyzing the specific threats to our business and ingesting the right threat intelligence data we can effectively tackle potential cyber-attacks. In this course, Threat Intelligence: Requirements, Planning, Direction and Review, you will learn how to implement an effective Threat Intelligence program. First, you will explore how to prepare for a TI program, including how to map the potential threats to your business. Next, you will discover how to gather requirements for your program, which includes both business and technical needs. After that, you will cover how to translate the requirements into a program design. Finally, you will learn how to build a solid Threat Intelligence team and how to share the TI knowledge with the appropriated destinations (such as directors, SOC teams and external parties). When you’re finished with this course, you will have the skills and knowledge required to build an effective threat intelligence program in your company. This course covers the third chapter of the Cyber Threat Intelligence Analyst (C|TIA or CTIA) Certification.

Table of contents
  1. Course Overview
  2. Preparing for a Threat Intelligence Program
  3. Gathering Requirements
  4. Designing the Threat Intelligence Program
  5. Building a Threat Intelligence Team
  6. Sharing Threat Intelligence

Coming Soon

Threat Intelligence: Data Collection and Processing

Coming Soon

by Pluralsight

Coming Soon

Threat Intelligence: Data Analysis

Coming Soon

by Pluralsight

Coming Soon

Threat Intelligence: Dissemination and Reporting of Intelligence

Coming Soon

by Pluralsight