Currently Empty: $0.00
About Course
Cybersecurity and technology-based mitigation approaches rely heavily on intelligence. This program aims to enhance your understanding and implementation of foundational threat intelligence concepts, including differentiating intelligence from data or information and highlighting its vital role in modern cybersecurity. Additionally, the program enables students to thoroughly explore the threat intelligence lifecycle, understand its significance in shaping team roles, delve into the ethical and legal considerations, and understand the importance of measuring threat intelligence effectiveness.
As you progress through the program, you’ll master the different types of threat intelligence: strategic, operational, tactical, and technical. You’ll learn how each uniquely contributes to areas like regulatory compliance and risk management. In the later modules, you’ll engage in hands-on activities that involve data collection, analysis, and the use of Threat Intelligence Platforms (TIPs) for real-world applications in threat hunting and detection.
Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role. The program culminates with a forward-looking perspective, emphasizing the importance of continuous learning and staying ahead of future trends in this ever-evolving field. Threat Intelligence Essentials is designed to prepare students for progressive careers as Security Operations Center (SOC) Analysts, Threat Intelligence Analysts, IT Risk Analysts, or Cybersecurity Analysts, enabling them to confidently tackle today’s cybersecurity challenges with expertise!
Who is it for?
- School students, graduates, professionals, career starters and changers, IT / Technology / Cybersecurity teams with little or no work experience.
- Anyone who wants to start a career in cybersecurity or threat intelligence.
- Anyone interested in threat intelligence, Indicators of Compromise (IoC) analysis, defensive cybersecurity operations, and incident response.
- Any professional involved in securing public, private, and hybrid cloud infrastructures, identities, data, and applications.
- IT / Cybersecurity professionals, system administrators, cloud administrators, cybersecurity administrators, engineers, and architects will also benefit from this course.
Key Features
- Engage in 5 practical lab exercises to comprehensively understand how to conduct threat intelligence operations directly.
- 18+ hours of premium self-paced video training
- 900+ pages of ecourseware
- Capstone Projects with Real-World CTF Challenges
- Year-long access to courseware and 6-month access to labs
- Proctored exam voucher with one-year validity
- Acquire skills to identify, assess, select, build, and execute threat intelligence workflows.
- Increase your value in the job market to advance your career.
- Earn EC-Council’s globally recognized certificate.
Exam Details
Training Details: Self-paced in-demand lecture videos led by world-class instructors and hands-on labs.
Pre-requisite: No prior cybersecurity knowledge or IT work experience required.
- Exam Code: 112-57
- Number of Questions: 75
- Exam Availability: EC-Council Exam Portal
- Test Duration: 2 hours
- Test Format: Multiple Choice
Course Content
Module 1: Introduction To Threat Intelligence
-
Threat Intelligence and Essential Terminology
-
Key Differences Between Intelligence, Information, and Data
-
The Importance of Threat Intelligence
-
Integrating Threat Intelligence in Cyber Operations
-
Threat Intelligence Lifecycles and Maturity Models
-
Threat Intelligence Roles, Responsibilities, and Use Cases
-
Using Threat Intelligence Standards or Frameworks to Measure Effectiveness
-
Establishing Splunk Attack Range for Hands-on Experience
Module 2: Types Of Threat Intelligence
Module 3: Cyber Threat Landscape
Module 4: Data Collection And Sources Of Threat Intelligence
Module 5: Threat Intelligence Platforms
Module 6: Threat Intelligence Analysis
Module 7: Threat Hunting And Detection
Module 8: Threat Intelligence Sharing And Collaboration
Module 9: Threat Intelligence In Incident Response
Module 10: Future Trends And Continuous Learning
Student Ratings & Reviews
The Threat Intelligence Essentials course was instrumental in expanding my expertise in cybersecurity. It provided a comprehensive understanding of threat actors, attack techniques, and threat intelligence tools. The hands-on exercises and real-world case studies were particularly enlightening, equipping me with the skills to proactively defend against cyber threats.