About Course

Cybersecurity and technology-based mitigation approaches rely heavily on intelligence. This program aims to enhance your understanding and implementation of foundational threat intelligence concepts, including differentiating intelligence from data or information and highlighting its vital role in modern cybersecurity. Additionally, the program enables students to thoroughly explore the threat intelligence lifecycle, understand its significance in shaping team roles, delve into the ethical and legal considerations, and understand the importance of measuring threat intelligence effectiveness.

As you progress through the program, you’ll master the different types of threat intelligence: strategic, operational, tactical, and technical. You’ll learn how each uniquely contributes to areas like regulatory compliance and risk management. In the later modules, you’ll engage in hands-on activities that involve data collection, analysis, and the use of Threat Intelligence Platforms (TIPs) for real-world applications in threat hunting and detection.

Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role. The program culminates with a forward-looking perspective, emphasizing the importance of continuous learning and staying ahead of future trends in this ever-evolving field. Threat Intelligence Essentials is designed to prepare students for progressive careers as Security Operations Center (SOC) Analysts, Threat Intelligence Analysts, IT Risk Analysts, or Cybersecurity Analysts, enabling them to confidently tackle today’s cybersecurity challenges with expertise!

Who is it for?

  • School students, graduates, professionals, career starters and changers, IT / Technology / Cybersecurity teams with little or no work experience.
  • Anyone who wants to start a career in cybersecurity or threat intelligence.
  • Anyone interested in threat intelligence, Indicators of Compromise (IoC) analysis, defensive cybersecurity operations, and incident response.
  • Any professional involved in securing public, private, and hybrid cloud infrastructures, identities, data, and applications.
  • IT / Cybersecurity professionals, system administrators, cloud administrators, cybersecurity administrators, engineers, and architects will also benefit from this course.

Key Features

  • Engage in 5 practical lab exercises to comprehensively understand how to conduct threat intelligence operations directly.
  • 18+ hours of premium self-paced video training
  • 900+ pages of ecourseware
  • Capstone Projects with Real-World CTF Challenges
  • Year-long access to courseware and 6-month access to labs
  • Proctored exam voucher with one-year validity
  • Acquire skills to identify, assess, select, build, and execute threat intelligence workflows.
  • Increase your value in the job market to advance your career.
  • Earn EC-Council’s globally recognized certificate.

Exam Details

Training Details: Self-paced in-demand lecture videos led by world-class instructors and hands-on labs.
Pre-requisite: No prior cybersecurity knowledge or IT work experience required.

  • Exam Code: 112-57
  • Number of Questions: 75
  • Exam Availability: EC-Council Exam Portal
  • Test Duration: 2 hours
  • Test Format: Multiple Choice

Show More

What Will You Learn?

  • Essential threat intelligence terminology, the role of intelligence in cybersecurity, and threat intelligence maturity models.
  • Evaluating different types of threat intelligence, such as strategic, operational, and more focused forms, which guide vulnerability management or regulatory landscapes.
  • he cyber threat landscape, trends, and ongoing challenges
  • Data collection and sources of threat intelligence
  • Threat Intelligence Platforms (TIPs)
  • Threat intelligence analysis
  • Threat hunting and detection
  • Threat intelligence in incident response
  • Threat intelligence sharing and collaboration
  • Future trends and continuous learning

Course Content

Module 1: Introduction To Threat Intelligence

  • Threat Intelligence and Essential Terminology
  • Key Differences Between Intelligence, Information, and Data
  • The Importance of Threat Intelligence
  • Integrating Threat Intelligence in Cyber Operations
  • Threat Intelligence Lifecycles and Maturity Models
  • Threat Intelligence Roles, Responsibilities, and Use Cases
  • Using Threat Intelligence Standards or Frameworks to Measure Effectiveness
  • Establishing Splunk Attack Range for Hands-on Experience

Module 2: Types Of Threat Intelligence

Module 3: Cyber Threat Landscape

Module 4: Data Collection And Sources Of Threat Intelligence

Module 5: Threat Intelligence Platforms

Module 6: Threat Intelligence Analysis

Module 7: Threat Hunting And Detection

Module 8: Threat Intelligence Sharing And Collaboration

Module 9: Threat Intelligence In Incident Response

Module 10: Future Trends And Continuous Learning

Student Ratings & Reviews

5.0
Total 1 Rating
5
1 Rating
4
0 Rating
3
0 Rating
2
0 Rating
1
0 Rating
2 months ago
The Threat Intelligence Essentials course was instrumental in expanding my expertise in cybersecurity. It provided a comprehensive understanding of threat actors, attack techniques, and threat intelligence tools. The hands-on exercises and real-world case studies were particularly enlightening, equipping me with the skills to proactively defend against cyber threats.