What is CTIA?
Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence.
Become a Certified Threat Intelligence Analyst
In the ever-changing threat landscape, C|TIA is an essential program for those who deal with cyber threats on a daily basis. Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.
C|TIA is a method-driven program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.
Certification Target Audience
This program addresses all the stages involved in the Threat Intelligence Life Cycle. This attention to a realistic and futuristic approach makes C|TIA one of the most comprehensive threat intelligence certifications on the market today. This program provides the solid, professional knowledge that is required for a career in threat intelligence, and enhances your skills as a Threat Intelligence Analyst, increasing your employability. It is desired by most cybersecurity engineers, analysts, and professions from around the world and is respected by hiring authorities.
The purpose of the CTIA credential is to:
To enable individuals and organizations with the ability to prepare and run a threat intelligence program that allows ‘evidence-based knowledge’ and provides ‘actionable advice’ about ‘existing and unknown threats’. To empower information security professionals with the skills to develop a professional, systematic, and repeatable real-life threat intelligence program.
To differentiate threat intelligence professionals from other information security professionals. For individuals: To provide an invaluable ability of structured threat intelligence to enhance skills and boost their employability. For more information on CTIA application process, please click here
Ethical Hacking is often referred to as the process of penetrating one’s own computer/s or computers to which one has official permission to do so as to determine if vulnerabilities exist and to undertake preventive, corrective, and protective countermeasures before an actual compromise to the system takes place.
Exam Information
CTIA (Prefix 312-85) exam is available at the ECC Exam Center. EC-Council reserves the right to revoke the certification status of candidates that do not comply with all EC-Council examination policies found here.
CTIA Exam Details
CTIA Exam Details | |
---|---|
Exam Duration | 2 Hours |
Number of Questions | 50 |
Passing Score | 70% |
Clause: Age Requirements and Policies Concerning Minors
Minors are not permitted to take the EC-Council exam without a written consent/indemnity letter signed by their parent or legal guardian, along with a supporting letter from their institution of learning. Only candidates from a nationally accredited institution of learning shall be considered.
Minor/Adult legal ages are defined by the country of residence/origin of the candidate. For further clarification or to submit a consent letter, please contact [email protected].
Disclaimer:
- EC-Council reserves the right to impose additional restriction to comply with the policy.
- EC-Council reserves the right to modify certification policies without notice.
- EC-Council reserves the right to revoke the certification of any person determined to be in breach of this policy.