Cyber Threat Analyst

I. Overview:

The CCTA training course equips participants with the necessary expertise and skills required to effectively identify, analyze, and mitigate cyber threats. Through a systematic and effective approach, attendees will acquire the ability to support an organization in developing and implementing a comprehensive threat hunting program.

II. Duration: 05 days (40 hours)
III. Objectives:

By the end of this training course, the participants will be able to:

  • Identify various types of cyber threats, understand their characteristics, and analyze their potential impact on organizational security
  • Establish robust incident response plans to effectively manage and mitigate security breaches and cyberattacks
  • Utilize advanced threat hunting techniques and tools to proactively search for and identify security threats within an organization's network
  • Formulate and validate threat hunting hypothesis using data-driven approaches and identify potential threats by leveraging
  • Design, implement, and continuously improve threat hunting programs within organizations
IV. Intended Audience:

This course is particularly advantageous and intended for:

  • Cybersecurity professionals such as incident responders and security operations center (SOC)
  • IT professionals who are involved in managing and security IT infrastructure
  • Security managers and directors who are responsible for an organization's security strategy
  • Professionals involved in penetration testing and ethical hacking in order to gain insights into the latest threats and defensive techniques
  • Individuals responsible for risk management, compliance, and governance
  • Aspiring cybersecurity professionals who want to gain foundational knowledge and skills in threat analysis
V. Prerequisites:
  • The main requirement for participating in this training course is having a fundamental understanding of cybersecurity principles and concepts.
VI. Course outlines:
  • Day 1: Fundamentals of cyber threat analysis and threat hunting frameworks
  • Day 2: Prepare, execute phase of threat hunting program and incident management plan
  • Day 3: Analyze and knowledge phase of threat hunting framework
  • Day 4: Building a cybersecurity culture, monitoring and measurement, and continual improvement
  • Day 5: Certification exam
  • Học trực tuyến

  • Học tại Hồ Chí Minh

  • Học tại Hà Nội


Các khóa học khác