Certified Threat Intelligence Analyst (C|TIA)

Certified Threat Intelligence Analyst (C|TIA)

Módulos

Módulo 1: Introducción a la Inteligencia de Amenazas

Este módulo establece los fundamentos del curso. Explora qué es la inteligencia de amenazas, sus tipos (estratégica, operativa, táctica y técnica) y los modelos de madurez. También se introduce el ciclo de vida de la inteligencia de amenazas y marcos como el de Gartner, CREST y el NICE Framework.

Aprenderás sobre la evolución de las amenazas cibernéticas, actores y motivaciones. Se abordan las técnicas de ataque, herramientas, tácticas y procedimientos (TTPs), junto con modelos como el Cyber Kill Chain y MITRE ATT&CK, los cuales ayudan a entender cómo se ejecutan los ataques persistentes avanzados (APT).

Se centra en la fase inicial del ciclo de vida de TI. Enseña cómo definir objetivos de inteligencia, establecer métricas, asignar roles, formular hipótesis y evaluar necesidades de información de forma estratégica, todo desde la perspectiva de una organización que implementa un programa de TI.

Aquí se profundiza en las técnicas de obtención de datos desde diversas fuentes: OSINT (fuentes abiertas), CCI (fuentes cerradas), HUMINT (fuente humana), datos técnicos como malware y logs. También se abordan procesos de limpieza, clasificación, y normalización de datos para análisis posterior.

El módulo enseña metodologías analíticas como ACH (Análisis de Hipótesis Contrarias), SACH, y técnicas de modelado de amenazas. El foco está en convertir los datos procesados en inteligencia útil, clara y procesable para la toma de decisiones o respuesta ante amenazas.

Se instruye sobre cómo comunicar los hallazgos de forma efectiva a las partes interesadas. Incluye formatos estándar (STIX, TAXII), técnicas para redactar reportes claros, confiables y oportunos, y buenas prácticas para compartir inteligencia con comunidades, agencias o equipos internos.

A specialized program that teaches cybersecurity professionals how to turn unknown threats into known threats by developing structured threat intelligence. It covers the entire threat intelligence lifecycle, from data collection to analysis, reporting, and dissemination — all aligned with international frameworks such as NICE and CREST.

At the end of the course, participants will be able to:

  • • Apply frameworks such as the Kill Chain and TTPs (Tactics, Techniques, and Procedures)
  • • Collect data from open-source and private sources
  • • Analyze information to generate actionable intelligence
  • • Create effective reports to share with stakeholders
  • • Proactively protect organizations against emerging threats

To fully benefit from the course, participants are required to have:

  • • At least 2 years of experience in cybersecurity
  • • Completed the official training with an EC-Council Accredited Training Partner

Certified Threat Intelligence Analyst (C|TIA) Applies
Certified Threat Intelligence Analyst (C|TIA) 24 hours

Learning Methodology

The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.

The instructor (live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.

The methodology seeks that the student does not memorize, but rather understands the concepts and how they are applied in a work environment.

As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.

Conditions to guarantee successful results:
  • a. An institution that requires the application of the model through organization, logistics, and strict control over the activities to be carried out by the participants in each training session.
  • b. An instructor located anywhere in the world, who has the required in-depth knowledge, expertise, experience, and outstanding values, ensuring a very high-level knowledge transfer.
  • c. A committed student, with the space, time, and attention required by the training process, and the willingness to focus on understanding how concepts are applied in a work environment, and not memorizing concepts just to take an exam.

Pre-enrollment

You do not need to pay to pre-enroll. By pre-enrolling, you reserve a spot in the group for this course or program. Our team will contact you to complete your enrollment.

Pre-enroll now

Infinity Payments

Make your payment quickly, safely and reliably


- For bank transfer payments, request the details by email capacita@aulamatriz.edu.co.

- If you wish to finance your payment through our credit options
(Sufi, Cooperativa Unimos or Fincomercio), click on the following link:
Ver opciones de crédito.

To continue you must
Or if you don't have an account you must

Description

A specialized program that teaches cybersecurity professionals how to turn unknown threats into known threats by developing structured threat intelligence. It covers the entire threat intelligence lifecycle, from data collection to analysis, reporting, and dissemination — all aligned with international frameworks such as NICE and CREST.

Objectives

At the end of the course, participants will be able to:

  • • Apply frameworks such as the Kill Chain and TTPs (Tactics, Techniques, and Procedures)
  • • Collect data from open-source and private sources
  • • Analyze information to generate actionable intelligence
  • • Create effective reports to share with stakeholders
  • • Proactively protect organizations against emerging threats

To fully benefit from the course, participants are required to have:

  • • At least 2 years of experience in cybersecurity
  • • Completed the official training with an EC-Council Accredited Training Partner

offers

Certified Threat Intelligence Analyst (C|TIA) Applies
Certified Threat Intelligence Analyst (C|TIA) 24 hours

Learning Methodology

The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.

The instructor(live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.

La metodología persigue que el estudiante "does not memorize", but rather "understands" the concepts and how they are applied in a work environment."

As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.

Conditions to guarantee successful results:
  • a. An institution that requires the application of the model through organization, logistics, and strict control over the activities to be carried out by the participants in each training session.
  • b. An instructor located anywhere in the world, who has the required in-depth knowledge, expertise, experience, and outstanding values, ensuring a very high-level knowledge transfer.
  • c. A committed student, with the space, time, and attention required by the training process, and the willingness to focus on understanding how concepts are applied in a work environment, and not memorizing concepts just to take an exam.

Pre-enrollment

You do not need to pay to pre-enroll. By pre-enrolling, you reserve a spot in the group for this course or program. Our team will contact you to complete your enrollment.

-->