Description
Develop the expertise of CTI professionals to manage the collection, analysis, and operational exploitation of threat intelligence in critical and multi-site environments. Integrate CTI flows into active defense, produce strategic alerts, and coordinate with SOC, CERT, IT, and business teams.
Learning Objectives
- Structure a CTI (Cyber Threat Intelligence) approach tailored to a multi-site industrial group
- Exploit and enrich IOCs (Indicators of Compromise) in interaction with detection tools and SOC teams
- Produce and disseminate actionable CTI alerts and bulletins for CISOs and executive committees
- Integrate CTI feeds into SIEM systems and remediation playbooks
- Prioritize threats in alignment with business and industrial contexts
Target Audience
Confirmed CTI analysts
Group CTI / Threat Intel managers in SOC
Operational CISOs
Members of an advanced CERT / incident response team
Security architects or technical investigators
Prerequisites
Confirmed experience (≥ 8 years) in cybersecurity, SOC, or CERT
Practical experience with threat intelligence tools (MISP, OpenCTI, IOC feeds)
Knowledge of MITRE ATT&CK, STIX/TAXII frameworks
Program Outline
Informations
Duration
3 jour(s)
21h
Tarif
2200 € HT
HT