This course’s purpose is not to serve as a preparation course for any certification examination, but will touch on concepts that are crucial for a CTI analyst to be able to effectively do their job. At the end of the course, possible certifications will be covered. This course will introduce students to the key concepts related to cyber intelligence and provide students with an in depth understanding of how the threat intelligence lifecycle works from the perspective of an intelligence analyst.
Moreover, the course introduces students to Key Concepts relating to technical Cybersecurity as well as Threat Intelligence specific terminology. During the course, students will gain an understanding of what is involved in the Direction and Planning of a cyber intelligence function. Students will be introduced to methodologies specific to the collection of data for cyber intelligence. Students will then be shown some key methodologies for analyzing data collected. This course will then explore how students can distill the intelligence they have analyzed into a finished intelligence product. During this section of the course students will be introduced into different reporting formats and methodologies. The course introduces students to strategic or managerial related activities. This aspect of the course will include topics such as Regulator Mandated TI schemes, the use of clear, concise language, and the use of risk-based language when presenting to management. Finally, this course leaves students with an understanding of the Legal and Ethical implications of working in threat intelligence. This section will outline how a CTI analyst, due to the nature of their work, will need to abide by a strict moral and legal code to protect their client’s privacy as well as ensure they are not violating any laws.
- A Computer science/cybersecurity student looking to gain real-world knowledge on Cyber Threat Intelligence.
- Career professional looking to make the jump into Cyber Threat Intelligence.
- An Engineer looking to improve their understanding of Cyber Threat Intelligence.
- A Leader looking to better understand the many cybersecurity work roles and how those roles fit into an organization.
- General Understanding of Computers
- Experience using Search Engines like: Google, Bing, or Duck Duck Go
- Basic understanding of Information Security topics such as Security Operations, Network Security Tools and Security Logging.
By the end of this course, students should be able to:
- Understand the phases of the Threat Intelligence Lifecycle
- Understand the types of data sources that can be used to create threat intelligence
- Understand Analytical techniques that can bolster a threat intelligence investigation
- Demonstrate an understanding of how to produce actionable and timely intelligence based on consumer needs
Students learn fundamental concepts essential for Cyber Threat Intelligence Analysts to know to perform effectively in their roles in the Threat Intelligence Practitioner course. Students will learn to apply intelligence within more extensive cybersecurity programs.
What is Cyber Threat Intelligence?
In simple terms, cyber threat intelligence is the collection of cyber threat information that has been evaluated, found reliable, and analyzed through meticulous and structured techniques. Cyber threat intelligence (CTI) requires that analysts have expertise in identifying similarities and differences in massive quantities of data and detecting deceptions to generate timely, accurate, and relevant intelligence. This understanding reduces uncertainty for the organization and brings threats and weaknesses to light.
What Does the Cyber Threat Intelligence Practitioner Course Cover?
This Cyber Threat Intelligence Practitioner course teaches the core concepts that a CTI analyst needs to know to perform successfully in their role. The curriculum is not meant to prepare students for any specific certification exams, but possible certifications students may want to pursue will be discussed. Students will gain an understanding of the threat intelligence lifecycle and how it works from the viewpoint of an intelligence analyst.
After completing the course, students should have an understanding of:
- Cybersecurity and cyber threat intelligence terminology
- The different types of information sources that can be used to create cyber threat intelligence
- Various analytical techniques that can strengthen a cyber threat intelligence investigation
- How to produce timely and actionable intelligence that is based on customer needs
- The phases of the cyber threat intelligence lifecycle
- Different intelligence reporting methodologies and formats
- The ethical and legal aspects and implications of working in the cyber threat intelligence field
Students who enroll in this training course should understand computers and experience using search engines (like Google, Bing, and Duck Duck Go). They should also have some foundational knowledge about information security areas like network security tools, security operations, and security logging.
Upon completion of the Threat Intelligence Practitioner course, students will have earned 4 CEU/CPE and will receive a Certificate of Completion.
Who Should Take the CTI Training Course?
The Threat Intelligence Practitioner course is designed for:
- IT career professionals who are wanting to make the transition into cyber threat intelligence
- Engineers who want to increase their knowledge about cyber threat intelligence
- Computer science or cybersecurity students who are looking to gain real-world experience in cyber threat intelligence
- Organizational leaders who want a better understanding of cybersecurity positions, roles, and how they fit into the organization
Why is Cyber Threat Intelligence Important?
In today’s cybersecurity industry, there are multiple challenges that organizations often face. There are increasingly more devious cybercriminals, a deluge of inessential data, false alarms across various security systems, and a significant shortage of skilled cybersecurity professionals. This increase makes the demand for cyber threat intelligence professionals very high. Organizations recognize the importance of cyber intelligence and, as a result, employ qualified and skilled threat intelligence analysts that gain much stronger security positions.
Additionally, cyber threat intelligence is essential because: it sheds light on the uncertain, allowing cybersecurity teams to make solid decisions
- it helps cybersecurity professionals have a better understanding of the cybercriminals’ decision-making processes
- it strengthens cybersecurity stakeholders by shedding light on adversarial motives, as well as their techniques, tactics, and methods
- it empowers organizational stakeholders, like executive boards, Chief Information Officers (CIO), Chief Information Security Officers (CISO), and Chief Technology Officers (CTO) to invest wisely, mitigate risks, be more efficient, and make quicker decisions
What Does a Cyber Threat Intelligence Analyst Do?
Cyber threat intelligence analysts are intelligence officers who use technical and scientific skills to solve complicated intelligence issues, produce written assessments, and brief the organization. At its core, the CTI analyst role requires analytical skills, initiative, creativity, and technical expertise. The position is sometimes more of an art form than a scientific one.
In their daily work, CTI analysts perform all-source analysis, adversary targeting, and digital forensics to discover, track, assess, and counter threats that are posed by cybercriminals against an organization’s data systems, essential infrastructure, and other cyber-related interests.
How to Learn More about Cyber Threat Intelligence
If you are interested in learning more about Cyber threat intelligence and what CTI analysts do in their roles, the Threat Intelligence Practitioner course is an ideal place to begin. Cybrary makes learning easy with self-paced, online courses that can be completed on your schedule. To enroll in this course, simply click on the Register button at the top of your screen.
Certificate of Completion
Complete this entire course to earn a Threat Intelligence Practitioner Certificate of Completion