Rocheston Cyberthreat Intelligence Analyst (RCIA)



RCIA Certification Training | Cyberthreat Intelligence Analyst | Vinsys
Enroll for RCIA Certification Training by Vinsys. Rocheston Cyberthreat Intelligence Analyst Provides Threats and Breaches in A System So That an Organization or System.
RCIA Certification Training, Cyberthreat Intelligence Analyst, Vinsys

Course Description:

Cyberthreat intelligence ensures reliability of information collected from any source by evaluating its originality and authenticity. Like any other intelligence agency, cyber threat intelligence detects threats and breaches in a system so that an organization or system can deliver services, products or conduct communication appropriately on time.

They are the qualified next generation security consultants whom organizations are hiring to detect the nature of security issues impeding their work and how to appropriately counter impending threats. On one hand, the large volume of digital data collected through electronic, human, internal, and external sources of an organization should be sorted, grouped and analyzed. On the other hand, the conditions or the circumstances that makes an organization vulnerable to threats also needs a closer look.


What will you learn?
The following are the skills that the student will pick up upon enrolling for the course:
  • Manage Operational security systems such as Intrusion Detection Systems (IDS), Security Information, and Event Management (SIEM) systems do generate threat intelligence inputs based on the industry.
  • Apply intelligence techniques to the aggregation and analysis of contextual and situational risks.
  • Provide information that links the probability and impact of a cyber-attack
  • Develop a framework for timely analysis and prioritization of potential threats and vulnerabilities given an industry’s threat landscape
  • Develop a strong defense against threat actor’s Tactics Techniques and Procedures (TTPs) using advanced threat modeling
  • Take corrective actions upon indicators of attack, especially in the defense and space technology sectors associated with nations’ security
  • Break the cyber-attack lifecycle perpetrated by other nations, that can be via a threat concept known
Audience:
  • Ethical Hackers
  • Managers
  • Architects
  • Engineers
  • Analysts
  • Security Practitioners
  • SOC Professionals
  • Malware Analysts
  • Digital Forensic Analysts
  • Information security professionals specializing in cyberthreat intelligence knowledge
Eligibility Criteria:
  • A Bachelor’s degree with one year of professional experience or credential in computer science, engineering, mathematics, or other information technology related fields. You will need basic hacking, networking, system administration, and Linux skills.
  • If you don’t have basic hacking skills, you can attend Rocheston’s Extreme Hacking Foundation Program.
Course Topics:
The modules that are part of the RCIE theory courses:
  • Module 1: Why Threat Intelligence
  • Module 2: What is Threat Intelligence
  • Module 3: Threat Detection Platform
  • Module 4: Security Operations
  • Module 5: Threat Intelligence Platform
  • Module 6: Threat Intelligence and Its Relationship to Incident Response
  • Module 7: Reports and Feeds
  • Module 8: Threat Intelligence in Vulnerability Administration
  • Module 9: Threat Intelligence for Security Leaders
  • Module 10: Threat Intelligence for Risk Evaluation
  • Module 11: Threat Intelligence for Fraud Prevention
  • Module 12: Threat Intelligence Analytical Frameworks
  • Module 13: The Threat Intelligence Journey
  • Module 14: Developing the Foundational Threat Intelligence Team
  • Module 15: Intrusion Analysis
  • Module 16: The Kill Chain Course of Action
  • Module 17: The Kill Chain Deep Dive
  • Module 18: Managing Multiple Kill Chains
  • Module 19: Malware Collection Sources
  • Module 20: Collection Sources (Domains)
  • Module 21: Collection Sources (External Datasets)
  • Module 22: Collection Sources (TLS Certicates)
  • Module 23: Exploitation (Storing and Structuring Data)
  • Module 24: Analysis of And Distribution of Intelligence
  • Module 25: Tactical Dissemination
  • Module 26: Operational Dissemination
  • Module 27: Fallacies of Logic / Cognitive Biases
  • Module 28: Strategic Dissemination
  • Module 29: Fine Tuning of Analysis
  • Module 30: Attribution
  • Module 31: Hunting
  • Module 32: Features Extraction
  • Module 33: Behavior Extraction
  • Module 34: Correlation and Clustering
  • Module 35: Penetration Testing
  • Module 36: Understanding Real Threats and Case Studies
Course Objectives:
In the RCIA program you will learn to:
  • Provide information that links the probability and impact of a cyber-attack
  • Develop a framework for timely analysis and prioritization of potential threats and vulnerabilities given an industry’s threat landscape
  • Apply intelligence techniques to the aggregation and analysis of contextual and situational risks
  • Take corrective actions upon indicators of attack, especially in the defense and space technology sectors associated with nations’ security
  • Develop a strong defense against threat actor’s Tactics Techniques and Procedures (TTPs) using advanced threat modeling
  • Manage Operational security systems such as Intrusion Detection Systems (IDS), Security Information, and Event Management (SIEM) systems do generate threat intelligence inputs based on the industry
  • Break the cyber-attack lifecycle perpetrated by other nations, that can be via a threat concept known

Key Features:
Course Advisor:
Filters:
1 Category Category related to project Product Page / Project Management / Certification
2 Batch Type For each product Corporate / Public
3 Course Availability Course date (from to) for each product  
4 Location Location of courses for each product  
5 Course Language   English
6 Select Mode Mode of attending training Classroom

FAQ’s
What is the course duration of RCIA?
The course duration for RCIA is around 40 hours and will be completed in 5 days.
I have education and work experience, where can I complete the 40 contact hours of RCIA?
You can join Vinsys " Rocheston Cyberthreat Intelligence Analyst (RCIA)" course at any of the open house session conducted across. If you are looking out to conduct this training in-house (within your office premises), we can facilitate for said service. You may reach us out at enquiry@vinsys.com, we shall revert to you within 24 hours.
Do you provide certificates on successfully completing the course?
Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course.
What all is included in the course?
Along with facilitating training sessions, we provide required course manuals. The candidate will receive a Welcome Kit and login information to access the Members’ Portal.
Who conduct the training sessions?
Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18 to 30+ years of overall experience.
When will the exam be conducted?
The exam will be held on the last day of the program. It will review your understanding of the course and test your understanding by means of specific objective questions.
How long is the course completion certificate valid?
The certification is valid for 2 years. You can renew the certificate at Accord portal for a certain fee.
What is the Cyberclass Web Portal?
The access to an online e-learning platform will be given to attendants on registration. It will contain a series of study videos, pre-recorded lectures, white papers, educational animations and power point presentations. The Web Portal can be used to catch-up on a missed session or to view an attended session again.
What is the retake policy?
You may retake the exam any time on an additional fee. For further details contact the exam coordinator.

©2011 SitesPower Training Institute. All Rights Reserved.