1 / 5

Lorcam Securities- Leading Cyber Security training provider

LORCAM is a growing information security firm providing information security solutions to clients. The following aspects play a role in why LORCAM is the best for security solutions: quality, value, frequent testing, professional environment, expert awareness & efficient time usage.

Download Presentation

Lorcam Securities- Leading Cyber Security training provider

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CTIA Cyber Threat Intelligence Analyst Course Agenda

  2. Index Domain 1: Introduction to Threat Intelligence Domain 2: Cyber Threats and Kill Chain Methodology Domain 3: Requirements, Planning, Direction, and Review Domain 4: Data Collection and Processing Domain 5: Data Analysis Domain 6: Dissemination and Reporting of Intelligence

  3. Domain 1: Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Weightage: 14% Domain 2: Cyber Threats and Kill Chain Methodology Weightage: 14% Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Domain 2: Cyber Threats and Kill Chain Methodology Weightage: 16% Understanding Organization’s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Domain 4: Data Collection and Processing Weightage: 24% Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management

  4. Domain 5: Data Analysis Weightage: 18% Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Domain 6: Dissemination and Reporting of Intelligence Weightage: 14% Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration

  5. www.lorcamsecurities.com info@lorcamsecurities.com

More Related