Which EC-Council Certified Threat Intelligence Analyst (CTIA) sub-module would you like to practice for?
| Module | Sub-Module | Practice Tests |
|---|---|---|
| 1. Introduction to Threat Intelligence | 1.1. Intelligence | |
| 1.2 Cyber Threat Intelligence Concepts | ||
| 1.3 Intelligence Lifecycle and Frameworks | ||
| 1.4 Threat Intelligence Platforms (TIPs) | ||
| 1.5 Threat Intelligence in the Cloud Environment | ||
| 1.6 Future Trends and Continuous Learning | ||
| 2. Cyber Threats and Attack Frameworks | 2.1 Cyber Threats | |
| 2.2 Advanced Persistent Threats | ||
| 2.3 Cyber Kill Chain | ||
| 2.4 MITRE ATT\&CK and Diamond Model | ||
| 2.5 Indicators of Compromise | ||
| 3. Planning, Direction, and Review | 3.1 Organization’s Current Threat Landscape | |
| 3.2 Requirements Analysis | ||
| 3.3 Plan a Threat Intelligence Program | ||
| 3.4 Establish Management Support | ||
| 3.5 Build a Threat Intelligence Team | ||
| 3.6 Threat Intelligence Sharing | ||
| 3.7 Review Threat Intelligence Program | ||
| 4. Data Collection and Processing | 4.1 Threat Intelligence Data Collection | |
| 4.2 Threat Intelligence Collection Management | ||
| 4.3 Threat Intelligence Feeds and Sources | ||
| 4.4 Threat Intelligence Data Collection and Acquisition | ||
| 4.5 Bulk Data Collection | ||
| 4.6 Data Processing and Exploitation | ||
| 4.7 Threat Data Collection and Enrichment in Cloud Environments | ||
| 5. Data Analysis | 5.1 Data Analysis | |
| 5.2 Data Analysis Techniques | ||
| 5.3 Threat Analysis | ||
| 5.4 Threat Analysis Process | ||
| 5.5 Fine-Tuning Threat Analysis | ||
| 5.6 Threat Intelligence Evaluation | ||
| 5.7 Create Runbooks and Knowledge Base | ||
| 5.8 Threat Intelligence Tools | ||
| 6. Intelligence Reporting and Dissemination | 6.1 Threat Intelligence Reports | |
| 6.2 Dissemination | ||
| 6.3 Participate in Sharing Relationships | ||
| 6.4 Sharing Threat Intelligence | ||
| 6.5 Delivery Mechanisms | ||
| 6.6 Threat Intelligence Sharing Platforms | ||
| 6.7 Intelligence Sharing Acts and Regulations | ||
| 6.8 Threat Intelligence Integration | ||
| 6.9 Threat Intelligence Sharing and Collaboration using Python Scripting | ||
| 7. Threat Hunting and Detection | 7.1 Threat Hunting Concepts | |
| 7.2 Threat Hunting Automation | ||
| Threat Intelligence in SOC Operations, Incident Response, and Risk Management | 8.1 Threat Intelligence in SOC Operations | |
| 8.2 Threat Intelligence in Risk Management | ||
| 8.3 Threat Intelligence in Incident Response |