Cyber Threat Analyst
I. Overview:
The CCTA training course equips participants with the necessary expertise and skills required to effectively identify, analyze, and mitigate cyber threats. Through a systematic and effective approach, attendees will acquire the ability to support an organization in developing and implementing a comprehensive threat hunting program.
II. Duration: 05 days (40 hours)
III. Objectives:
By the end of this training course, the participants will be able to:
- Identify various types of cyber threats, understand their characteristics, and analyze their potential impact on organizational security
- Establish robust incident response plans to effectively manage and mitigate security breaches and cyberattacks
- Utilize advanced threat hunting techniques and tools to proactively search for and identify security threats within an organization's network
- Formulate and validate threat hunting hypothesis using data-driven approaches and identify potential threats by leveraging
- Design, implement, and continuously improve threat hunting programs within organizations
IV. Intended Audience:
This course is particularly advantageous and intended for:
- Cybersecurity professionals such as incident responders and security operations center (SOC)
- IT professionals who are involved in managing and security IT infrastructure
- Security managers and directors who are responsible for an organization's security strategy
- Professionals involved in penetration testing and ethical hacking in order to gain insights into the latest threats and defensive techniques
- Individuals responsible for risk management, compliance, and governance
- Aspiring cybersecurity professionals who want to gain foundational knowledge and skills in threat analysis
V. Prerequisites:
- The main requirement for participating in this training course is having a fundamental understanding of cybersecurity principles and concepts.
VI. Course outlines:
- Day 1: Fundamentals of cyber threat analysis and threat hunting frameworks
- Day 2: Prepare, execute phase of threat hunting program and incident management plan
- Day 3: Analyze and knowledge phase of threat hunting framework
- Day 4: Building a cybersecurity culture, monitoring and measurement, and continual improvement
- Day 5: Certification exam
Học trực tuyến
Học tại Hồ Chí Minh
Học tại Hà Nội



