SOFNET
Certified Threat Intelligence CTI] Analyst - Expert Level
As a Threat Intelligence Analyst, you will understand the whole process of setting up a Threat Intel Platform to secure your organization against attacks.
More than 100 successful hacking has occurred in the world per minute. The need for skilled cybersecurity professionals has never been greater!
COACH
20+ Years Experience
HYBRID CLASSES
Face-to-Face / Online Classes
DURATION
5 Days
CERTIFICATION BY


HRD CORP REGISTERED TRAINING PROVIDER

HRD CORP CLAIMBABLE
Securing the Future with
Essential Cyber Defense Strategies
Threat Intelligence is essential evidence-based knowledge about cybersecurity threats and hazards, crucial for informed responses in the face of increasing cyber threats and automation-driven attacks. It allows organizations to take a more effective, preventive and proactive strategy.
Empowering IT Personnel the skillsets to collect intelligence, correlate industry-specific attacks with their infrastructure, and proactively defend the organization
Unified Defense Approach that establishes a cohesive framework and cultivates a cybersecurity intelligence mindset that can be shared across the organization.
University-backed Curriculum
Relevant to the Real World Practices
CERTIFICATION OF COMPLETION

BECOME A CYBERSECURITY CTI ANALYST IN
5 Days
What You’ll Learn
Learn fundamental concepts of Threat Intelligence, understand the entire process of setting up a Threat Intel Platform and develop cybersecurity infrastructure defenses.
Preventive & Proactive Security
- Threat Intelligence Framework
- Cyber Threat Detection
- Incident Response Methodology
- Cybersecurity Tool Utilization
- Malware Analysis & Information Sharing
- Risk Management
- Reporting and Documentation
In-Depth Training and Extensive
Cybersecurity Modules
Gain in-depth knowledge of security threats, attacks, vulnerabilities, attacker’s behaviors, cyber kill chain, SOC processes, procedures, technologies, and automation workflows.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Pioneering Over 20-Years Of IT
Expertise & Cybersecurity

Meet Dr. Clement Arul
Dr. Clement Arul is a seasoned IT professional with 20- years of experience, specializing in cybersecurity framework, ethical hacking, security risk & governance, big data, IoT, systems analysis (design, development, secure coding, implementation), digital forensics, and project management. He has made significant contributions to national cybersecurity frameworks and has collaborated with multiple ASEAN governments to develop and implement their cybersecurity strategies. Dr. Arul’s expertise is widely recognized, with his active participation in 600+ public conferences across ASEAN in recent years.
Get Funded & Learn New Skills

Our cybersecurity program is fully reimbursable through HRD Corp.
Allows you to gain access to high-quality training at no extra cost!
Take advantage of this financial flexibility to invest in your professional career today.
Our graduate testimonials

Adam Smith
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Jhon Deo
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Maria Mak
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Jackma Kalin
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Amily Moalin
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Who this Course is For
IT Professionals: System administrators, network engineers, and security operators who want to enhance their cybersecurity skills.
Cybersecurity Specialists: Individuals working in cybersecurity roles, such as security analysts and entry-level cybersecurity professionals.
Business Executives and Decision-Makers: Business leaders and executives who oversee organization cybersecurity strategies.
Pricing & Payment Plans
Installments
from as low as
RM 1,750/month
excluding admin fees and 6% SST
*Discounts available for first time self-paying individuals.
Full Tuition
Total
RM 7,500
excluding admin fees and 6% SST
*Discounts available for first time self-paying individuals.
Financing By

Apply To The Next Certified Threat Intelligence (CTI) Analyst Course
NEXT COURSE STARTS ON JANUARY 22, 2024
DEADLINE FOR APPLICATION JANUARY 17, 2024
Explore all of our courses
