Free EC-Council CTIA Practice Tests (by Modules and Sub-modules)

Which EC-Council Certified Threat Intelligence Analyst (CTIA) sub-module would you like to practice for?

ModuleSub-ModulePractice Tests
1. Introduction to Threat Intelligence1.1. Intelligence
1.2 Cyber Threat Intelligence Concepts
1.3 Intelligence Lifecycle and Frameworks
1.4 Threat Intelligence Platforms (TIPs)
1.5 Threat Intelligence in the Cloud Environment
1.6 Future Trends and Continuous Learning
2. Cyber Threats and Attack Frameworks2.1 Cyber Threats
2.2 Advanced Persistent Threats
2.3 Cyber Kill Chain
2.4 MITRE ATT\&CK and Diamond Model
2.5 Indicators of Compromise
3. Planning, Direction, and Review3.1 Organization’s Current Threat Landscape
3.2 Requirements Analysis
3.3 Plan a Threat Intelligence Program
3.4 Establish Management Support
3.5 Build a Threat Intelligence Team
3.6 Threat Intelligence Sharing
3.7 Review Threat Intelligence Program
4. Data Collection and Processing4.1 Threat Intelligence Data Collection
4.2 Threat Intelligence Collection Management
4.3 Threat Intelligence Feeds and Sources
4.4 Threat Intelligence Data Collection and Acquisition
4.5 Bulk Data Collection
4.6 Data Processing and Exploitation
4.7 Threat Data Collection and Enrichment in Cloud Environments
5. Data Analysis5.1 Data Analysis
5.2 Data Analysis Techniques
5.3 Threat Analysis
5.4 Threat Analysis Process
5.5 Fine-Tuning Threat Analysis
5.6 Threat Intelligence Evaluation
5.7 Create Runbooks and Knowledge Base
5.8 Threat Intelligence Tools
6. Intelligence Reporting and Dissemination6.1 Threat Intelligence Reports
6.2 Dissemination
6.3 Participate in Sharing Relationships
6.4 Sharing Threat Intelligence
6.5 Delivery Mechanisms
6.6 Threat Intelligence Sharing Platforms
6.7 Intelligence Sharing Acts and Regulations
6.8 Threat Intelligence Integration
6.9 Threat Intelligence Sharing and Collaboration using Python Scripting
7. Threat Hunting and Detection7.1 Threat Hunting Concepts
7.2 Threat Hunting Automation
Threat Intelligence in SOC Operations, Incident Response, and Risk Management8.1 Threat Intelligence in SOC Operations
8.2 Threat Intelligence in Risk Management
8.3 Threat Intelligence in Incident Response
Scroll to Top