C|TIA is a method-driven course that uses a holistic approach, covering
concepts from planning the threat intelligence project to building a report to
disseminating threat intelligence. These concepts are highly essential while
building effective threat intelligence and, when used properly, can secure
organizations from future threats or attacks.
The Purpose of C|TIA is: To enable individuals and organizations with the
ability to prepare and run a threat intelligence program that allows ‘evidencebased knowledge’ and provides ‘actionable advice’ about ‘existing and
unknown threats.’ To ensure that organizations have predictive capabilities
rather than just proactive measures beyond active defense mechanism; to
empower information security professionals with the skills to develop a
professional, systematic, and repeatable real-life threat intelligence program;
to differentiate threat intelligence professionals from other information
security professionals. For individuals: To provide an invaluable ability to
structured threat intelligence to enhance skills and boost their employability
-
Course Learning Outcomes
Students who successfully complete this class will be able to:
- » Learn various fundamental concepts about cyber threat intelligence, including its importance, types, lifecycle, strategy, capabilities, maturity model, frameworks, etc.
- » Understand various stages of an attack and the deep dive scenario to build appropriate mitigation and defensive mechanisms to protect the organization from known and unknown threats
- Enable organizations to build a threat intelligence program and identify the right team members to implement the program
- » Learn various concepts of threat intelligence data collection and processing, including its importance, types, feeds and sources, data collection management, storing and structuring of data, etc.
- » Comprehend various concepts of data analysis and threat analysis process along with techniques for fine-tuning threat analysis and the like, which helps the analysts to extract better threat intelligence
- Apply the techniques of evaluating the intelligence and creating a knowledge base for storing threat information
- » Learn how to mitigate the risks posed by various cyber threats to improve the security posture of the organizations