Protect your data and infrastructure with intelligence
threats: our comprehensive training to develop
your Cyber Threat Intelligence skills
Eligible CPF and multi-financing up to 100%
To be recalled Access to the programmeApproach 3P
Our training centre guides you in identifying the ideal training, helping you maximize funding opportunities.
We put all the keys in hand for a start with confidence.
Experience an immersive and intensive training experience, designed to dive into practical workshops and real case studies.
Learn by doing, and develop concrete skills directly applicable to your future projects.
At the end of your career, we evaluate your acquired skills, issue certification attesting to your expertise, and accompany you to ensure your success in your professional projects.
You are now ready to excel!
Description of the training
This training provides the skills necessary to collect, analyse and use information on cyber threats in order to anticipate, detect and respond effectively to cyber attacks.
Objectives of training
At the end of this training, participants will be able to:
- Understand the foundations of Cyber Threat Intelligence.
- Collect, analyze and correlate information on threats.
- Use ITC tools and platforms.
- Produce exploitable intelligence reports.
- Integrate ITC into a defensive cybersecurity strategy.
Who is this training for?
The training is aimed at a wide audience, including:
- Computer security officers.
- Systems and networks administrators.
- Cybersecurity consultants.
- Cloud Architects and Infrastructure.
- Compliance and Governance Professionals IT.
Prerequisites
No specific prerequisites are required.
Training programme
Introduction to Cyber Threat Intelligence
- Typologies of intelligence (strategic, tactical, operational, technical)
- The intelligence cycle
- Role of ITC in a comprehensive security strategy
- Differences between cloud security and the security of traditional infrastructure.
- Typology of attackers: APTs, hacktivists, cybercriminals, insiders
- TTPs (Techniques, Tactics and Procedures)
- Case studies: analysis of known actors (e.g. Lazarus, FIN7)
- OSINT (Open Source Intelligence)
- HUMINT, SIGINT, Dark Web, underground forums
- Technical sources (logs, IOC, sandbox, honeypots)
- Collection tools (e.g. Maltego, SpiderFoot, Shodan)
- Cloud Access Governance and Management (IAM, RBAC)
- Cloud Network Security Configuration: Firewall, VPC, and Application Security
- Multi-factor authentication (MFA)
- Identity and Compliance Management Strategies
- Standard formats (STIX, TAXII, IODEF).
- Preparation of exploitable ITC reports (executive vs. technical)
- Information sharing (ISACs, CERTs, public/private partnerships)
- Integration with SOC, SIEM and other security teams
- ITC and proactive detection
- Case of use in risk management and incident response
- CTI limitations and challenges (biash, audit, over-information)
- Analysis of an APT from open sources
- Creation and dissemination of an ITC report
Training assets
- Pedagogical approach: An alternative between theory and practice for better assimilation of concepts.
- Qualified speakers: Specialist trainers with practical experience in the field of cloud security.
- Educational tools and materials: Access to online resources, live demonstrations and real-life case studies.
- Accessibility: Training is open to all, without advanced technical prerequisites.
Pedagogical methods and tools used
Live demonstrations on cloud security.
Real case studies and practical work.
Discussions on best practices in the field.
Project management tools for monitoring and feedback.
Evaluation
- MCQ at the end of training.
- Practical case studies.
- Continuous evaluation with personalized feedback.
Normative References
- Well-Architected Cloud Providers Framework
- ISO/IEC 19086
- GDPR (General Data Protection Regulation)
- NIST Cloud Computing Standards (SP 500-292)
- ISO 27001 Information Security: Guarantees data security in cloud environments while monitoring and managing costs