
Advanced Cyber Threat Intelligence Analyst
Develop advanced knowledge and skills to become a dominant force in cyber threat intelligence.
- 40+ hours of training content
- CREST Aligned CRTIA course
- 87 units covering an extraordinary amount of content
Imagine cyber threat intelligence as a process that turns collected cyber threat information into valuable insights for those who need it. This intelligence is created by skilled professionals who carefully analyse the information to identify potential risks and opportunities. Let's break it down into simpler terms:
Cyber threat intelligence is like turning pieces of scattered information into a clear and helpful picture of potential cyber threats. It helps people understand what threats might be out there and how to deal with them effectively.
Think of it as a circular process. First, we identify what information we need. Then, we plan how to collect that information and gather it. Next, we carefully analyze the data to create valuable intelligence. This intelligence is then shared with others. The process keeps repeating as we learn more and get new information. Take a look at the short introductory video below delivered by Stewart Bertram and taken from our Cyber Threat Intelligence 101 course.
Intelligence analysis is not just about gathering and sharing information; it's about thinking deeply and carefully. Analysts use special techniques to identify and manage biases and uncertainties. This helps make sure that the conclusions they reach are accurate and reliable.
There are three main levels of cyber threat intelligence:
Cyber threat intelligence is useful for various people and roles, from top executives and policymakers to IT specialists and law enforcement officers. It helps everyone respond faster and more effectively to cyber threats, making better decisions about risks and resources.
Cyber threat intelligence (CTI) is still an emerging discipline in many ways and consequently the path to becoming a CTI analyst is never a straight line. The thing to remember when choosing a course, is that the role of a CTI analyst is a mixture of art, craft and science. So, don't let 'foie gras'd with capital' companies try and convince you that a practical lab looking at log files is prime CTI... it isn't! You will need to invest time and effort in reading threat intelligence reports and keeping up to date on the latest tactics, techniques and procedures being used by nefarious groups.
If you are interested in cyber threat intelligence and would like to learn more, take a look at our available cyber threat intelligence courses below.

Develop advanced knowledge and skills to become a dominant force in cyber threat intelligence.

Learn the fundamental techniques and skills to shine in your career as a cyber threat intelligence analyst

Start learning about cyber threat intelligence with this short intro course taken from our PTIA.

Learn the fundamental techniques and skills to shine in your career as a cyber threat intelligence analyst

This course is about sales for cyber security people
Cyber Threat Intelligence entails evaluating, verifying, and reporting information regarding existing and potential cyber threats, with the aim of preserving an organisation's situational awareness.
Learn more...Incident Response involves proactive preparation for, effective handling of, and subsequent follow-up on cyber security incidents to minimise organisational damage and prevent future occurrences.
Learn more...Security Testing encompasses the examination and assessment of a network, system, product, or design to validate compliance with designated security requirements and to identify potential vulnerabilities (penetration testing).
Learn more...Digital Forensics involves identifying and reconstructing the pertinent sequence of events that led to the present observable state of a target IT system.
Learn more...Network Monitoring and Intrusion Detection entails observing network and system activity to detect unauthorised user actions or potential intrusions by attackers.
Learn more...Secure System Development involves creating and updating a system or product in accordance with established security requirements and standards throughout its lifecycle.
Learn more...Identity & Access Management encompasses the administration of policies, procedures, and controls to guarantee that only authorised individuals can access information or computer-controlled resources.
Learn more...Cyber Security Governance & Risk Management involves overseeing adherence to established cyber security policies and handling the assessment and mitigation of relevant risks.
Learn more...