EC Council Certified Threat Intelligence Analyst Training in Switzerland

  • Learn via: Classroom
  • Duration: 3 Days
  • Level: Intermediate
  • Price: From €2,853+VAT
We can host this training at your preferred location. Contact us!

Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialistlevel program that teaches a structured approach for building effective threat intelligence.

The program was based on a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. This program differentiates threat intelligence professionals from other information security professionals. It is a highly interactive, comprehensive, standards-based, intensive 3-day training program that teaches information security professionals to build professional threat intelligence.

In the ever-changing threat landscape, C|TIA is an highly essential program for those who deal with cyber threats on a daily basis. Organizations today demand a professional level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.

C|TIA is a method-driven program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks. This program addresses all the stages involved in the Threat Intelligence Life Cycle, with This attention to a realistic and futuristic approach makes C|TIA one of the most comprehensive threat intelligence certifications on the market today. This program provides the solid, professional knowledge that is required for a career in threat intelligence, and enhances your skills as a Threat Intelligence Analyst, increasing your employability. It is desired by most cybersecurity engineers, analysts, and professions from around the world and is respected by hiring authorities.

Target Audience

  • Ethical Hackers

  • Security Practitioners, Engineers, Analysts, Specialist, Architects, Managers

  • Threat Intelligence Analysts, Associates, Researchers, Consultants

  • Threat Hunters

  • SOC Professionals

  • Digital Forensic and Malware Analysts

  • Incident Response Team Members

  • Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience.

  • Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence.

  • Individuals interested in preventing cyber threats.

Certification

The C|TIA exam can be challenged after the completion of the complete, official C|TIA training program. Candidates that successfully pass the exam will receive their C|TIA certificate and membership privileges. Members are required to adhere to the policies of EC-Council’s Continuing Education Policy.

Eligibility Criteria

To be eligible to challenge the C|TIA Exam, the candidate must either:

  • Attend official EC-Council C|TIA training through an accredited EC-Council Partner (Accredited Training Center, iWeek, iLearn) (All candidates are required to pay the USD100 application fee unless your training fee already includes this)

or

  • Submit an application showing a minimum of 2 years working experience in information security (All candidates are required to pay USD 100 as a non-refundable application fee)

100% compliance to NICE 2.0 and CREST frameworks

C|TIA maps 100 percent to the National Initiative for Cybersecurity Education (NICE) in the category “Analyze” and specialty area

“Threat/Warning Analyst (TWA)”, as well as the “CREST Certified Threat Intelligence Manager (CC TIM).”

Focus on developing skills for performing various types of threat intelligence

It focuses on developing the skills to perform different types of threat intelligence including strategic, operational, tactical, and technical threat intelligence for a particular organization.

Emphasis on various data collection techniques from multiple sources and feeds

It emphasizes various data collection techniques from various sources and feeds. It allows students to employ different data collection strategies to collect relevant threat information.

Emphasis on collection, creation, and dissemination of Indicators of Compromise (IoCs) in various formats

C|TIA discusses Indicators of Compromise (IoCs) indetail, including internal and external IoCs. It illustrates how to acquire these IoCs from various sources. IoCs are a good source of information about cyber threats and an organization can easily detect cyberattacks and respond in time by monitoring IoCs. C|TIA elaborately explains how to create and disseminate these IoCs.

Focus on intense malware analysis to collect adversary data and pivot off of it

It explains in detail how to reverse engineer malware and pivot off of it in order to determine the origin, functionality, and potential impact of malware as well as determine the threat actor. This is a crucial skill required for threat intelligence analyst.

Focus on a structured approach for performing threat analysis and threat intelligence evaluation

Analyzing the collected threat data and evaluating the required threat intelligence from the analysis process is one of the crucial steps for extracting threat intelligence. C|TIA discusses a structured approach that can be employed by an analyst for performing threat analysis and also threat modeling. This program also illustrates how to fine-tune the analysis process in order to filter out unnecessary information and extract effective intelligence. C|TIA also discuss different types of threat intelligence evaluation techniques for acquiring desired intelligence.

Focus on various techniques for threat intelligence reporting and dissemination

C|TIA emphasizes the creation of efficient threat intelligence reports. It describes building blocks for threat intelligence sharing along with different sharing rules and models. It explains the best practices for sharing TI and also discuss different intelligence sharing acts and regulations.

Hands-on program

More than 40 percent of class time is dedicated to the learning of practical skills, and this is achieved through EC-Council labs.

Theory to practice ratio for C|TIA program is 60:40, providing students with a hands-on experience of the latest threat intelligence tools, techniques, methodologies, frameworks, scripts, etc. C|TIA comes integrated with labs to emphasize the learning objectives.

Lab environment simulates a real-time environment

The C|TIA lab environment consists of the latest operating systems including Windows 10 and Kali Linux for planning, collecting, analyzing, evaluating, and disseminating threat intelligence.

Covers latest threat intelligence tools, platforms, and frameworks

The C|TIA course includes a library of tools, platforms, and frameworks across different operation platforms that are required by security professionals to extract effective organizational threat intelligence. This provides a wider option to students than any other program on the market.

Module 1

Introduction to Threat Intelligence

Module 2

Cyber Threats and Kill Chain Methodology

Module 3

Requirements, Planning, Direction, and Review

Module 4

Data Collection and Processing

Module 5

Data Analysis

Module 6

Intelligence Reporting and Dissemination



Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Switzerland facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
13 Ocak 2025
Bern, Zürih, Cenevre
3 Days
Classroom / Virtual Classroom
26 Ocak 2025
Bern, Zürih, Cenevre
3 Days
Classroom / Virtual Classroom
13 Ocak 2025
Bern, Zürih, Cenevre
3 Days
Classroom / Virtual Classroom
12 Şubat 2025
Bern, Zürih, Cenevre
3 Days
Classroom / Virtual Classroom
26 Ocak 2025
Bern, Zürih, Cenevre
3 Days
Classroom / Virtual Classroom
23 Şubat 2025
Bern, Zürih, Cenevre
3 Days
Classroom / Virtual Classroom
26 Şubat 2025
Bern, Zürih, Cenevre
3 Days
Classroom / Virtual Classroom
12 Şubat 2025
Bern, Zürih, Cenevre
3 Days
EC Council Certified Threat Intelligence Analyst Training Course in Switzerland

Switzerland, or officially known as the Swiss Confederation, is a federated country of central Europe. Because of its linguistic diversity, Switzerland is known by a variety of native names, such as Schweiz, Suisse, Svizzera and Svizra. While Bern is the administrative capital, Lausanne is the judicial centre of Switzerland. Zurich, Geneva and Basel are bases of some important international organisations such as the WTO, the WHO and FIFA. The country is well-known for its high welfare; Switzerland has the highest nominal wealth per adult.

Alongside the beautiful scenery, tourists visit Switzerland for the country's cultural attractions. There are many museums, galleries and historic buildings within popular cities such as Zurich, Geneva, and Lausanne. One of the most popular things to do is a train journey to the Top of Europe; Jungfraujoch. The longest glacier in Europe, the Great Aletsch Glacier begins at Jungfraujoch, and is also a UNESCO World Heritage Site.

Experience a paradigm shift in IT training with Bilginç IT Academy as we cater to the specific needs of Switzerland. Our training catalog showcases an array of Certification Exam preparation courses and accredited corporate training options, all delivered with innovative methodologies that will transform your learning journey.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.