CTI

Cyber Threat Intelligent

In this course, students will gain a deep knowledge in Threat Intelligence & Threat hunting technics. 

40 Hours

Cloud Environment

Instructor Led

Virtual Labs & Simulation

Cyber Threat Intelligence (CTI) is a 40-hour course designed to develop skills in threat intelligence and threat hunting. Students learn how to collect intelligence using OSINT tools, analyze malware behavior, and detect abnormal activity on endpoints. The course covers the intelligence lifecycle, OSINT methods, and tools like Shodan, Maltego, MISP, and YARA. With 28 hours of hands-on labs, it emphasizes real-world investigation and threat detection. Ideal for SOC analysts, incident responders, and cybersecurity practitioners with a background in IT
WHO IS IT FOR
Incident responders, analysts and team leaders
SOC analysts and operators.
Cyber security practitioners.
STEM Master students
GOALS
Collect Intelligence from different sources & tools
Look for suspicious activity of Malware & Malicious code on your endpoints
Perform Threat Hunting planning and find abnormal behavior
Requirements
IT background
Basic knowledge of Monitoring & Security tools
Initial security experience
  • Threat Intelligence Lifecycle​​ 
  • Standards, tactics, feeds, tools 
  • OSIN Introduction and sources 
  • What to look for – types of information and threats 
  • Process and procedures 
  • tools 
  • Shodan and Maltego, MISP, Yara rules 
  • Definitions of Threat Hunting 
  • Identifying Goals and Missions 
  • Understanding the Process Workflow 
  • Establishing a Threat Hunting Process 
  • Overview of Threat Hunting in Operating Systems 
  • Deep Dive into Malware Behaviors 

28 Hours of hands-on activities

Total amount of practical experience during this course.

Contact Us