RCIA Certification Training (Cyber threat Intelligence Analyst)

Watch demo Course

Cyberthreat intelligence ensures the reliability of information collected from any source by evaluating its originality and authenticity. Like any other intelligence agency, cyber threat intelligence detects threats and breaches in a system so that an organization or system can deliver services, products or conduct communication appropriately on time. They are the qualified next-generation security consultants whom organizations are hiring to detect the nature of security issues impeding their work and how to appropriately counter impending threats. On one hand, the large volume of digital data collected through electronic, human, internal, and external sources of an organization should be sorted, grouped and analyzed. On the other hand, the conditions or the circumstances that make an organization vulnerable to threats also needs a closer look.

4.7/5

(286 Ratings)

350

The following are the skills that the student will pick up upon enrolling for the course:

  • Manage Operational security systems such as Intrusion Detection Systems (IDS), Security Information, and Event Management (SIEM) systems do generate threat intelligence inputs based on the industry.
  • Apply intelligence techniques to the aggregation and analysis of contextual and situational risks.
  • Provide information that links the probability and impact of a cyber-attack
  • Develop a framework for timely analysis and prioritization of potential threats and vulnerabilities given an industry’s threat landscape
  • Develop a strong defense against threat actor’s Tactics Techniques and Procedures (TTPs) using advanced threat modeling
  • Take corrective actions upon indicators of attack, especially in the defense and space technology sectors associated with nations’ security
  • Break the cyber-attack lifecycle perpetrated by other nations, that can be via a threat concept known

  • Ethical Hackers
  • Managers
  • Architects
  • Engineers
  • Analysts
  • Security Practitioners
  • SOC Professionals
  • Malware Analysts
  • Digital Forensic Analysts
  • Information security professionals specializing in cyberthreat intelligence knowledge

  • A Bachelor’s degree with one year of professional experience or credential in computer science, engineering, mathematics, or other information technology related ­fields. You will need basic hacking, networking, system administration, and Linux skills.
  • If you don’t have basic hacking skills, you can attend Rocheston’s Extreme Hacking Foundation Program.

Module 1: Why Th­reat Intelligence

Module 2: What is Th­reat Intelligence

Module 3: Th­reat Detection Platform

Module 4: Security Operations

Module 5: Th­reat Intelligence Platform

Module 6: ­Threat Intelligence and Its Relationship to Incident Response

Module 7: Reports and Feeds

Module 8: ­Threat Intelligence in Vulnerability Administration

Module 9: ­Threat Intelligence for Security Leaders

Module 10: ­Threat Intelligence for Risk Evaluation

Module 11: Th­reat Intelligence for Fraud Prevention

Module 12: ­Threat Intelligence Analytical Frameworks

Module 13: Th­e Th­reat Intelligence Journey

Module 14: Developing the Foundational Th­reat Intelligence Team

Module 15: Intrusion Analysis

Module 16: ­The Kill Chain Course of Action

Module 17: ­The Kill Chain Deep Dive

Module 18: Managing Multiple Kill Chains

Module 19: Malware Collection Sources

Module 20: Collection Sources (Domains)

Module 21: Collection Sources (External Datasets)

Module 22: Collection Sources (TLS Certi­cates)

Module 23: Exploitation (Storing and Structuring Data)

Module 24: Analysis of And Distribution of Intelligence

Module 25: Tactical Dissemination

Module 26: Operational Dissemination

Module 27: Fallacies of Logic / Cognitive Biases

Module 28: Strategic Dissemination

Module 29: Fine Tuning of Analysis

Module 30: Attribution

Module 31: Hunting

Module 32: Features Extraction

Module 33: Behavior Extraction

Module 34: Correlation and Clustering

Module 35: Penetration Testing

Module 36: Understanding Real Threats and Case Studies

In the RCIA program you will learn to:

  • Provide information that links the probability and impact of a cyber-attack
  • Develop a framework for timely analysis and prioritization of potential threats and vulnerabilities given an industry’s threat landscape
  • Apply intelligence techniques to the aggregation and analysis of contextual and situational risks
  • Take corrective actions upon indicators of attack, especially in the defense and space technology sectors associated with nations’ security
  • Develop a strong defense against threat actor’s Tactics Techniques and Procedures (TTPs) using advanced threat modeling
  • Manage Operational security systems such as Intrusion Detection Systems (IDS), Security Information, and Event Management (SIEM) systems do generate threat intelligence inputs based on the industry
  • Break the cyber-attack lifecycle perpetrated by other nations, that can be via a threat concept known

What is the course duration of RCIA?

The course duration for RCIA is around 40 hours and will be completed in 5 days.

I have education and work experience, where can I complete the 40 contact hours of RCIA?

You can join Vinsys " Rocheston Cyberthreat Intelligence Analyst (RCIA)" course at any of the open house session conducted across. If you are looking out to conduct this training in-house (within your office premises), we can facilitate for said service. You may reach us out at enquiry@vinsys.com, we shall revert to you within 24 hours.

 

Do you provide certificates on successfully completing the course?

Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course.

What all is included in the course?

Along with facilitating training sessions, we provide required course manuals. The candidate will receive a Welcome Kit and login information to access the Members’ Portal.

Who conduct the training sessions?

Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18 to 30+ years of the overall experience.

When will the exam be conducted?

The exam will be held on the last day of the program. It will review your understanding of the course and test your understanding by means of specific objective questions.

 

How long is the course completion certificate valid?

The certification is valid for 2 years. You can renew the certificate at Accord portal for a certain fee.

 

­What is the Cyber class Web Portal?

­The access to an online e-learning platform will be given to attendants on registration. It will contain a series of study videos, pre-recorded lectures, white papers, educational animations, and powerpoint presentations. ­The Web Portal can be used to catch-up on a missed session or to view an attended session again.

What is the retake policy?

You may retake the exam any time on an additional fee. For further details contact the exam coordinator.

The following are the skills that the student will pick up upon enrolling for the course:

  • Manage Operational security systems such as Intrusion Detection Systems (IDS), Security Information, and Event Management (SIEM) systems do generate threat intelligence inputs based on the industry.
  • Apply intelligence techniques to the aggregation and analysis of contextual and situational risks.
  • Provide information that links the probability and impact of a cyber-attack
  • Develop a framework for timely analysis and prioritization of potential threats and vulnerabilities given an industry’s threat landscape
  • Develop a strong defense against threat actor’s Tactics Techniques and Procedures (TTPs) using advanced threat modeling
  • Take corrective actions upon indicators of attack, especially in the defense and space technology sectors associated with nations’ security
  • Break the cyber-attack lifecycle perpetrated by other nations, that can be via a threat concept known
  • Ethical Hackers
  • Managers
  • Architects
  • Engineers
  • Analysts
  • Security Practitioners
  • SOC Professionals
  • Malware Analysts
  • Digital Forensic Analysts
  • Information security professionals specializing in cyberthreat intelligence knowledge
  • A Bachelor’s degree with one year of professional experience or credential in computer science, engineering, mathematics, or other information technology related ­fields. You will need basic hacking, networking, system administration, and Linux skills.
  • If you don’t have basic hacking skills, you can attend Rocheston’s Extreme Hacking Foundation Program.

Module 1: Why Th­reat Intelligence

Module 2: What is Th­reat Intelligence

Module 3: Th­reat Detection Platform

Module 4: Security Operations

Module 5: Th­reat Intelligence Platform

Module 6: ­Threat Intelligence and Its Relationship to Incident Response

Module 7: Reports and Feeds

Module 8: ­Threat Intelligence in Vulnerability Administration

Module 9: ­Threat Intelligence for Security Leaders

Module 10: ­Threat Intelligence for Risk Evaluation

Module 11: Th­reat Intelligence for Fraud Prevention

Module 12: ­Threat Intelligence Analytical Frameworks

Module 13: Th­e Th­reat Intelligence Journey

Module 14: Developing the Foundational Th­reat Intelligence Team

Module 15: Intrusion Analysis

Module 16: ­The Kill Chain Course of Action

Module 17: ­The Kill Chain Deep Dive

Module 18: Managing Multiple Kill Chains

Module 19: Malware Collection Sources

Module 20: Collection Sources (Domains)

Module 21: Collection Sources (External Datasets)

Module 22: Collection Sources (TLS Certi­cates)

Module 23: Exploitation (Storing and Structuring Data)

Module 24: Analysis of And Distribution of Intelligence

Module 25: Tactical Dissemination

Module 26: Operational Dissemination

Module 27: Fallacies of Logic / Cognitive Biases

Module 28: Strategic Dissemination

Module 29: Fine Tuning of Analysis

Module 30: Attribution

Module 31: Hunting

Module 32: Features Extraction

Module 33: Behavior Extraction

Module 34: Correlation and Clustering

Module 35: Penetration Testing

Module 36: Understanding Real Threats and Case Studies

In the RCIA program you will learn to:

  • Provide information that links the probability and impact of a cyber-attack
  • Develop a framework for timely analysis and prioritization of potential threats and vulnerabilities given an industry’s threat landscape
  • Apply intelligence techniques to the aggregation and analysis of contextual and situational risks
  • Take corrective actions upon indicators of attack, especially in the defense and space technology sectors associated with nations’ security
  • Develop a strong defense against threat actor’s Tactics Techniques and Procedures (TTPs) using advanced threat modeling
  • Manage Operational security systems such as Intrusion Detection Systems (IDS), Security Information, and Event Management (SIEM) systems do generate threat intelligence inputs based on the industry
  • Break the cyber-attack lifecycle perpetrated by other nations, that can be via a threat concept known

What is the course duration of RCIA?

The course duration for RCIA is around 40 hours and will be completed in 5 days.

I have education and work experience, where can I complete the 40 contact hours of RCIA?

You can join Vinsys " Rocheston Cyberthreat Intelligence Analyst (RCIA)" course at any of the open house session conducted across. If you are looking out to conduct this training in-house (within your office premises), we can facilitate for said service. You may reach us out at enquiry@vinsys.com, we shall revert to you within 24 hours.

 

Do you provide certificates on successfully completing the course?

Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course.

What all is included in the course?

Along with facilitating training sessions, we provide required course manuals. The candidate will receive a Welcome Kit and login information to access the Members’ Portal.

Who conduct the training sessions?

Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18 to 30+ years of the overall experience.

When will the exam be conducted?

The exam will be held on the last day of the program. It will review your understanding of the course and test your understanding by means of specific objective questions.

 

How long is the course completion certificate valid?

The certification is valid for 2 years. You can renew the certificate at Accord portal for a certain fee.

 

­What is the Cyber class Web Portal?

­The access to an online e-learning platform will be given to attendants on registration. It will contain a series of study videos, pre-recorded lectures, white papers, educational animations, and powerpoint presentations. ­The Web Portal can be used to catch-up on a missed session or to view an attended session again.

What is the retake policy?

You may retake the exam any time on an additional fee. For further details contact the exam coordinator.

Request More Information
images/rocheston.png
Corporate Training for Business
  • Blended Learning Delivery Model (Self-Paced E-Learning And/Or Instructor-Led Options)
  • Course, Category, And All-Access Pricing
  • Enterprise-Class Learning Management System (LMS)
  • Enhanced Reporting For Individuals And Teams
  • 24x7 Teaching Assistance And Support 

Reviews

reviewer.png

Amitkirti Chougule

Support Specialist

I was a Rocheston RCIA Certification Training Professional. To progress, I wanted to do the Rocheston Cyberthreat Intelligence Analyst. I joined Vinsys who was offering a Rocheston RCIA Certification Training Program for this course. I found the program to be very helpful. During the Rocheston RCIA Certification Training, I was able to learn the principles and processes needed to create and manage service offering based on business requirements.


reviewer.png

Srinath Bashyam

Executive Level

Being a Rocheston RCIA Certification Training means that I need to constantly update my skills and keep in touch with all the upcoming technologies and software. I decided to take up theRocheston RCIA Certification Training Program offered by Vinsys. By finishing this program I was able to polish my skill even further.


reviewer.png

Shyamal Saxena

Executive Level

I wanted to take my knowledge and skills up to the next level. But being a Rocheston RCIA Certification Training, it is not an easy task. I went and consulted a firm named Vinsys where I came to know about the Rocheston RCIA Certification Training Boot Camp. I joined it as soon as possible and as successful in doing what I needed.


Find this Course at other locations:

+91-20-67444700

Australia | China | Kenya | India | Malaysia | Oman | Singapore | Tanzania | UAE | USA |

enquiry@vinsys.com