Training Mile2

Training goals dlearning

code: C)TIA | version: v1.0

Everywhere you turn today, you hear about the need for threat intelligence analysis! However, in some cases, it is just a buzzword, while in other cases, threat intelligence is being touted as the remedy toward advanced persistent threats. The real question is, how do we leverage threat intelligence to reduce network vulnerabilities without wasting time and money? The answer is  simple, Mile2’s Certified Threat Intelligence Analyst course.


Mile2’s C)TIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization.


Mile2’s C)TIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them.  The C)TIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. 


Once complete, the student will be competent toward improving a company’s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk.


Upon Completion

Upon completion, Certified Threat Intelligence Analyst students will be able to proactively collect threat data and implement strategies to limit exposure to those threats.  Additionally, they will be prepared to take the CTIA exam.

Who Should Attend:

  • IS Security Officers
  • IS Managers
  • Risk Managers
  • Auditors
  • Information Systems Owners
  • IS Control Assessors
  • System Managers
  • Government Employees

Mile2® is:

ACCREDITED by the NSA CNSS 4011-4016

MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework

APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Conspect Show list

  • Threat Intelligence Basics
  • Cyber Threats
  • Threat Actors
  • Case Studies
  • Threat Identification
  • Proactive Approach
  • Labs
    • Practical Analysis
    • Hunting Active Threats
    • Defensive Threat Dev.
    • Integration with SIEM
    • OSINT Methodology
Download conspect training as PDF

Additional information


Participation in the following Mile2 courses:

  • C)VA - Certified Vulnerability Assessor
  • C)PEH - Certified Professional Ethical Hacker
  • C)PTE - Certified Penetration Testing Engineer

or equivalent knowledge

Difficulty level
Duration 5 days

The participants will obtain certificates signed by Mile2 (course completion).

This course will help prepare you for the Certified Threat Intelligence Analyst exam, which is available through the on-line Mile2’s Assessment and Certification System (“MACS”), and is accessible on your account. The exam will take 2 hours and consist of 100 multiple choice questions.

Each participant in an authorized training C)TIA – Certified Threat Intelligence Analyst will receive a free CTIA exam voucher.


Certified Mile2 Instructor.

Additional informations

We also recommend further training and certification: C)CSA - Certified Cyber Security Analyst

Other training Mile2 | Cyber Threat Analyst

Training thematically related


Contact form

Please fill form below to obtain more info about this training.

* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

1400 EUR








  • hybrid training: HYBRID
    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
  • hybrid training: HYBRID
    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
Book a training appointment

Traditional training

Sessions organised at Compendium CE are usually held in our locations in Kraków and Warsaw, but also in venues designated by the client. The group participating in training meets at a specific place and specific time with a coach and actively participates in laboratory sessions.

Dlearning training

You may participate from at any place in the world. It is sufficient to have a computer (or, actually a tablet, or smartphone) connected to the Internet. Compendium CE provides each Distance Learning training participant with adequate software enabling connection to the Data Center. For more information, please visit site


Paper materials

Traditional materials: The price includes standard materials issued in the form of paper books, printed or other, depending on the arrangements with the manufacturer.

Electronic materials

Electronic materials: These are electronic training materials that are available to you based on your specific application: Skillpipe, eVantage, etc., or as PDF documents.

Ctab materials

Ctab materials: the price includes ctab tablet and electronic training materials or traditional training materials and supplies provided electronically according to manufacturer's specifications (in PDF or EPUB form). The materials provided are adapted for display on ctab tablets. For more information, check out the ctab website.

Upcoming Mile2 training

Training schedule Mile2