Certified Threat Intelligence Analyst

  • Home
  • Certified Threat Intelligence Analyst
Certified Threat Intelligence Analyst

Course Description

The C|TIA exam can be challenged post the completion of attending the complete official C|TIA course. Candidates that successfully pass the exam will receive their C|TIA certificate and membership privileges. Members are required to adhere to the policies of EC-Council’s Continuing Education Policy.It is a highly interactive, comprehensive, standards-based, intensive 3-day training program that teaches information security professionals to build professional threat intelligence.

image

Training Modules

Introduction to Threat Intelligence
Cyber Threats and Kill Chain Methodology
Requirements, Planning, Direction, and Review
Data Collection and Processing
Data Analysis
Intelligence Reporting and Dissemination

About the Exam and Certification

Examination

C|TIA allows cybersecurity professionals to demonstrate their mastery of the knowledge and skills required for threat intelligence

Number of Questions: 50
Duration: 2 hours
Availability: EC-Council Exam Portal
Test Format: Multiple Choice
Passing Score: 70%

Eligibility Criteria
To be eligible to challenge the C|TIA Exam, the candidate must either:

Attend official EC-Council C|TIA training through an accredited EC-Council Partner (Accredited Training Center, iWeek, or iLearn) (All candidates are required to pay the USD100 application fee unless your training fee already includes this) or
Submit an application showing a minimum of 2 years working experience in information security (All candidates are required to pay USD 100 as a non-refundable application fee)

The Purpose of the CTIA is to:

To enable individuals and organizations with the ability to prepare and run a threat intelligence program that allows ‘evidence-based knowledge’ and provides ‘actionable advice’ about ‘existing and unknown threats’.
To ensure that organizations have predictive capabilities rather than just proactive measures beyond active defense mechanism.
To empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program.
To differentiate threat intelligence professionals from other information security professionals.
For individuals: To provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability