Training Mile2

Training goals dlearning

code: C)TIA | version: v1.0

Everywhere you turn today, you hear about the need for threat intelligence analysis! However, in some cases, it is just a buzzword, while in other cases, threat intelligence is being touted as the remedy toward advanced persistent threats. The real question is, how do we leverage threat intelligence to reduce network vulnerabilities without wasting time and money? The answer is  simple, Mile2’s Certified Threat Intelligence Analyst course.


Mile2’s C)TIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization.


Mile2’s C)TIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them.  The C)TIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. 


Once complete, the student will be competent toward improving a company’s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk.


Upon Completion

Upon completion, Certified Threat Intelligence Analyst students will be able to proactively collect threat data and implement strategies to limit exposure to those threats.  Additionally, they will be prepared to take the CTIA exam.

Who Should Attend:

  • IS Security Officers
  • IS Managers
  • Risk Managers
  • Auditors
  • Information Systems Owners
  • IS Control Assessors
  • System Managers
  • Government Employees

Mile2® is:

ACCREDITED by the NSA CNSS 4011-4016

MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework

APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Conspect Show list

  • Threat Intelligence Basics
  • Cyber Threats
  • Threat Actors
  • Case Studies
  • Threat Identification
  • Proactive Approach
  • Labs
    • Practical Analysis
    • Hunting Active Threats
    • Defensive Threat Dev.
    • Integration with SIEM
    • OSINT Methodology
Download conspect training as PDF

Additional information


Participation in the following Mile2 courses:

  • C)VA - Certified Vulnerability Assessor
  • C)PEH - Certified Professional Ethical Hacker
  • C)PTE - Certified Penetration Testing Engineer

or equivalent knowledge

Difficulty level
Duration 5 days

The participants will obtain certificates signed by Mile2 (course completion).

This course will help prepare you for the Certified Threat Intelligence Analyst exam, which is available through the on-line Mile2’s Assessment and Certification System (“MACS”), and is accessible on your account. The exam will take 2 hours and consist of 100 multiple choice questions.

Each participant in an authorized training C)TIA – Certified Threat Intelligence Analyst will receive a free CTIA exam voucher.


Certified Mile2 Instructor.

Additional informations

We also recommend further training and certification: C)CSA - Certified Cyber Security Analyst

Other training Mile2 | Cyber Threat Analyst

Training thematically related


Contact form

Please fill form below to obtain more info about this training.

* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.


  • In order to propose a date for this training, please contact the Sales Department

Upcoming Mile2 training

Training schedule Mile2