Home
>
Courses
>
Threat Intelligence
Course

Threat Intelligence

Cyber Threat Intelligence (CTI) covers the collection, analysis, and use of threat intelligence to defend against cyber threats. Additionally, the course delves into standards for threat intelligence sharing and methods for threat modeling and adversary emulation, providing students with the skills to combat cyber adversaries effectively.

Hour Course Icon
Hours
40 Academic Hours
Format Course Icon
Format
Online
Duration Course Icon
Duration
4 Weeks

LIVE, instructor-led training

Participants will gain a holistic understanding of how to:

• Lead cybersecurity strategy at agency and national level

• Govern large-scale incident response and multi-agency crises

• Secure modern cloud and digital service platforms

• Embed security into digital product deliveries

• Prepare organisations for AI-driven and next-generation threats

The bootcamp combines executive briefings, case studies, interactive workshops, and hands-on cyber exercises delivered on CyberproAI’s Cympire Cyber Range, enabling leaders to experience real-world cyber crises in a controlled, immersive environment.

Learning Outcomes

This course is designed for cybersecurity professionals, IT practitioners, and ethical hackers looking to deepen their expertise in web application security.

It’s ideal for those who already have a foundational knowledge of networking and security and want to advance their skills in identifying, exploiting, andmitigating web-based vulnerabilities. Whether you’re a penetration tester, security analyst, or IT manager, this course will provide practical tools and insights to help you defend against modern cyber threats targeting web applications.

Target Audience

This course is designed for cybersecurity professionals, IT specialists, and individuals looking to enhance their understanding of cyber threat intelligence (CTI).

Ideal for those with foundational cybersecurity knowledge, it aims to equip participants with the skills to collect, analyze, and utilize threat intelligence effectively.

Whether you are an aspiring CTI analyst, a security operations center (SOC) team member, or a cybersecurity manager looking to strengthen your team’s defense capabilities, this course offers valuable insights into threat modeling, adversary emulation, and the standards for sharing threat intelligence.

Required Prior Knowledge

• Foundational cybersecurity principles

• Basic cyber threat intelligence

Training for CompTIA’s certifications

Learning Method

Computing Requirements

• CPU: Intel i5/i7 or AMD 5x/7x

• RAM: 16GB

• HDD: 300GB available space

Introduction to CTI

  • What is threat intelligence
  • Types of threat intelligence and use cases
  • Strategic threat intelligence
  • Operational threat intelligence
  • Threat actors, threat vectors and APT
  • Motivation of threat actors
  • Intelligence requirements, terms of reference
  • The diamond model
  • The MITRE ATT&CK framework

The Threat Intelligence Cycle

  • What is the CTI cycle
  • Translating intelligence requirements to action
  • The 5 phases
  • The roles in every step

The Cyber Kill Chain

  • The different phases
  • Analysis of attack vectors
  • How to break the kill chain

Direction

  • The elements of the direction phase
  • Differences between IRs, PIRs and RFIs
  • Identifying intelligence gaps

Collection

  • What is collection
  • Sources of CTI
  • Open and closed sources
  • The Dark Net
  • The three grading systems for intelligence

Analysis

  • What is a hypothesis
  • Testing hypotheses
  • Using analytical techniques to identify critical information

Dissemination

  • What is dissemination
  • Ways to present intelligence
  • Reporting

Legal and Ethical

  • Identifying legal and ethical practices
  • How to handle classified information

Learn More
Register
Arrow Icon

$ 4200*

$ 5400

* Special Launch Pricing - Act Fast
* The price is excluding booking of
venue and refreshments
Learn More
Register