Cyber Security Category

EC-Council Threat Intelligence Essentials - Self-paced

  • Length 365 days access
  • Inclusions Exam voucher
Course overview
Book now

Why study this course

Begin Your Cybersecurity Journey with Hands-On, Technical Foundational Skills in Threat Intelligence. 

Cybersecurity and technology-based mitigation approaches rely heavily on intelligence. This program aims to enhance your understanding and implementation of foundational threat intelligence concepts, including differentiating intelligence from data or information and highlighting its vital role in modern cybersecurity. Additionally, the program enables students to thoroughly explore the threat intelligence lifecycle, understand its significance in shaping team roles, delve into the ethical and legal considerations, and understand the importance of measuring threat intelligence effectiveness. 

As you progress through the program, you’ll master the different types of threat intelligence: strategic, operational, tactical, and technical. You’ll learn how each uniquely contributes to areas like regulatory compliance and risk management. In the later modules, you’ll engage in hands-on activities that involve data collection, analysis, and the use of Threat Intelligence Platforms (TIPs) for real-world applications in threat hunting and detection.  

Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role. The program culminates with a forward-looking perspective, emphasising the importance of continuous learning and staying ahead of future trends in this ever-evolving field.  

Threat Intelligence Essentials is designed to prepare students for progressive careers as Security Operations Center (SOC) Analysts, Threat Intelligence Analysts, IT Risk Analysts, or Cybersecurity Analysts, enabling them to confidently tackle today’s cybersecurity challenges with expertise! 

  • Engage in 5 practical lab exercises to comprehensively understand how to conduct threat intelligence operations directly

  • 18+ hours of premium self-paced video training  

  • 900+ pages of ecourseware  

  • Capstone Projects with Real-World CTF Challenges  

  • Year-long access to courseware and 6-month access to labs  

  • Proctored exam voucher with 1-year validity  

  • Acquire skills to identify, assess, select, build, and execute threat intelligence workflows

Request Course Information


What you’ll learn

  • Essential threat intelligence terminology, the role of intelligence in cybersecurity, and threat intelligence maturity models

  • Evaluating different types of threat intelligence, such as strategic, operational, and more focused forms, which guide vulnerability management or regulatory landscapes

  • The cyber threat landscape, trends and ongoing challenges

  • Data collection and sources of threat intelligence

  • Threat Intelligence Platforms (TIPs)

  • Threat intelligence analysis

  • Threat hunting and detection

  • Threat intelligence sharing and collaboration

  • Threat intelligence in incident response

  • Future trends and continuous learning


EC-Council ATC Shield Logo

EC-Council at Lumify Work

The International Council of E-Commerce Consultants (EC-Council) is a member-based organisation that certifies individuals in various e-business and information security skills. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), EC-Council Certified Security Analyst (ECSA) and Licensed Penetration Tester (LPT) certifications and cyber security courses. Lumify Work is the partner of choice for EC-Council in Australia.


Who is the course for?

  • School students, graduates, professionals, career starters and changers, IT / Technology / Cybersecurity teams with little or no work experience.

  • Anyone who wants to start a career in cybersecurity or threat intelligence.

  • Anyone interested in threat intelligence, Indicators of Compromise (IoC) analysis, defensive cybersecurity operations, and incident response.

  • Any professional involved in securing public, private, and hybrid cloud infrastructures, identities, data, and applications.

  • IT / Cybersecurity professionals, system administrators, cloud administrators, cybersecurity administrators, engineers, and architects will also benefit from this course.


Course subjects

Module 1: Introduction to Threat Intelligence
This section will introduce you to the program and provide you with foundational information about threat intelligence. 

Module 2: Types of Threat Intelligence
This section will focus on helping students understand key distinctions and use cases for various threat intelligence types. Students will further understand how various sources generate threat intelligence and how it informs downstream cybersecurity processes or compliance functions 

Module 3: Cyber Threat Landscape
This section will help students better understand the current state of cybersecurity threats, emerging trends, obstacles, and how current threat actors are impacting society. 

Module 4: Data Collection and Sources of Threat Intelligence
This section will teach students how to conduct searches or acquire threat intelligence from reputable sources. Students will also learn how to conduct Open-Source Intelligence (OSINT) gathering activities and other threat intelligence collection methods directly.  

Module 5: Threat Intelligence Platforms
This section will show students how to access and use several leading Threat Intelligence Platforms (TIPs), such as the AlienVault Open Threat Exchange (OTX) and MISP. 

Module 6: Threat Intelligence Analysis
This section will show students how to access and use several leading Threat Intelligence Platforms (TIPs), such as the AlienVault Open Threat Exchange (OTX) and MISP. This section will help students explore and apply data analysis techniques against acquired threat intelligence, including Indicators of Compromise (IoC) and tactics, techniques, or procedures generated by threat actors. Students will learn how to prioritise multiple threats, comprehensive threat intelligence reporting, and concepts for visualising threat intelligence data sets.

Module 7: Threat Hunting and Detection
This section will provide an operational overview of Threat Hunting, contemporary threat hunting methodologies, and tools or techniques students can leverage to perform hypothesis-driven threat hunts.

Module 8: Threat Intelligence Sharing and Collaboration
This section will discuss the benefits of threat intelligence information sharing, platforms used to share industry-specific threat intelligence, and the cybersecurity or regulatory concerns that influence information sharing. 

Module 9: Threat Intelligence in Incident Response
This section will discuss the benefits of threat intelligence information sharing, platforms used to share industry-specific threat intelligence, and the cybersecurity or regulatory concerns that influence information sharing. This section will discuss methods students can adopt to integrate threat intelligence effectively into cybersecurity Incident Response (IR) plans or processes. Concepts covered in this section include incorporating threat intelligence into triage, forensics, lessons learned, and other incident response processes.

Module 10: Future Trends and Continuous Learning
This section will discuss the impact of technological developments like Artificial Intelligence (AI) that are helping to drive innovation in the Threat Intelligence community. This section will also explore complementary educational sources that will allow them to enhance their professional development or pursue threat intelligence career options and approaches that are useful for staying current with modern threat intelligence practices. 

Refer to the T|IE Outline for a deeper dive into the T|IE curriculum.


Prerequisites

No IT / Cybersecurity Experience Required.


Terms & Conditions

The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.


Request Course Information

Select and book a course

Options

Can't find a date you like?

Contact sales