Certified Threat Intelligence Analysis Manager ( C-TIAM)


Intelligence allows analysts to gain tactical, operational, and strategic advantages for customers of their intelligence product. Converting overwhelming amounts of raw data into relevant and actionable intelligence also affords analytical teams the decision and competitive advantage necessary to successfully engage and defeat a diverse variety of threat actors in the physical world and cybersecurity environments. Using highly developed analytical skills, analysts can maximize the benefits and efficiency of their supporting technology and automation, and significantly increase the threat intelligence capabilities of their organization.

Automation and software are important tools, but they are not the “heart and soul” of threat intelligence. While they streamline data collection and reporting, the most powerful tool in any intelligence arsenal is the human mind. Many cybersecurity managers – despite their advanced skill and experience – focus solely on technology and overlook the most valuable component of the intelligence process: the Analyst.

The Certified Threat Intelligence Analysis Manager course strengthens the abilities of analyst’s minds by training students in topics such as the Target-Centric Intelligence Life Cycle, Analytical Skill Development, Collection Management, Targeting Models, Structured Analytic Techniques, and considerations for creating high-performing Intelligence Teams.


Course Prerequisites

This course was developed for government, corporate, and military cybersecurity personnel serving in leadership roles such as SOC/NOC Managers, Law Enforcement Investigators, Red Team and Blue Team Leaders, and Threat/Warning Intelligence Managers.  Participants in this course should have knowledge of threat and vulnerability assessments, threat intelligence software and automation, and at least 12 months of leadership experience in their respective role.  An understanding of intelligence analysis concepts is desirable but not required.


Certification Course Outline

* Describing Intelligence by Type
* The Primary Mission: Decision Advantage
* Common Analytical Errors
* Intelligence Sources and Methods
* Strategic, Operational, and Tactical Intelligence
* The Limitations of Intelligence
* The Intelligence Process
* The Intelligence Life Cycle (Traditional)
* The Intelligence Life Cycle (Target-Centric)
* The Target as a Network
* The Team-Generated Intelligence Model
* Benefits of Target-Centric Intelligence
* Cyber Adversaries vs. Cyber Defenders
* Nation-State Threat Actors
* Advanced Persistent Threats
* Nonstate Threat Actors
* Legal Challenges in Intelligence Collection
* Respected Threat Intelligence Sources
* Overview of Basic Thinking Abilities
* Critical Thinking: The Elements of Thought
* The 8 Intellectual Standards of Analysis
* Avoiding Analytical Pitfalls
* An Overview of Biases
* An Overview of Logical Fallacies
* The Role of the Collection Manager
* Collection Requirements Management Process
* Conducting a Gap Analysis
* Analyst and Collector Collaboration
* Overview of the Collection Strategy
* Developing a Collection Plan
* The Intelligence Issue
* Preliminary Research Questions
* Identifying Issue Categories
* The PMESII / ASCOPE Matrix
* The Key Assumptions Check
* Issue Decomposition
* Modeling the Intelligence Target
* Intelligence Modeling Concepts
* Creating Intelligence Profiles
* The Model Hierarchy
* Creating a Target Framework
* Target Frameworks: Deconstructing Elements
* Issue Decomposition and the Target Framework
* Analyzing Existing Intelligence
* Sources of Raw Intelligence
* Evaluating the Credentials of Evidence
* Combining Types of Evidence
* The Role of Information Technology
* Anticipatory Analysis
* Background Forces
* Anticipatory Analysis Methodology
* Extrapolation, Projection, and Forecasting
* Influence Tree and Influence Net Diagrams
* High-Impact / Low-Probability Analysis
* Structured Analytic Techniques
* Sorting Methodology
* Matrices Methodology
* Event Mapping Methodology
* Event Tree Methodology
* Subjective Probability Methodology
* Relationship Modeling and Analysis
* Network Model Types
* Overview of Network Analysis
* Centrality and Equivalence
* Threat Network Analysis
* Target Network Analysis
* Overview of Simulation Modeling
* Types of Simulations
* Creating and Running a Simulation
* Simulations Used in Intelligence Analysis
* Decision Modeling and Simulation
* Game Theory and Decision Response
* The Purpose of Outcome Scenarios
* The Role of Outcome Scenarios
* Types of Scenarios
* Scenario Perspectives
* How to Construct Scenarios
* Using Red Team Analysis
* The Threat Intelligence Analysis Team
* Approaches to Building an Intelligence Team
* Cognitive and Social Perspectives
* Co-Acting Groups vs. Work Teams
* Options for Intelligence Team Structures
* Key Roles and Responsibilities

For registration information, please call us at +971 4 279 1474, or email: [email protected]

For information about the course content please contact:

Dr Cornelius Ncube, email: [email protected]  or +971 56 8346725

The British University in Dubai

Block 11, 1st and 2nd floor, Dubai International Academic City PO Box 345015, Dubai, UAE

Tel: +971 4 279 1400

Whatsapp: +971 50 701 2843 and +971 4 279 1400

Email: [email protected]

Our COVID-19 protocols