Department of Cybersecurity, Faculty of Computing, University of Port Harcourt

Threat Intelligence Essentials (T|IE)

Version 1 (Academia Series)Labs w/CTF, Exam Prep, ECC EV w/RPS

Begin your Cybersecurity Journey with Hands-on, Foundational Skills in Threat Intelligence Essentials

Self Paced (Discount)

₦197,183

Tutor Led (Discount)

₦297,183

Official Price

₦508,300

EC-Council Threat Intelligence Essentials (TIE)

The Threat Intelligence Essentials course equips learners with a strong technical foundational knowledge of threat intelligence concepts and tools. It provides essential knowledge in topics like cyber threat landscape, types of threat landscape, and more preparing you for progressive career paths as a threat intelligence analyst. No IT/Cybersecurity experience required for this course.

Test your learnings with CTF-based Capstone Projects and validate your newly acquired skills in proctored exams. Further, the course offers 18+ hours of premium self-paced video training in 10 modules with 5 labs to prepare students for real-world problems.

Key Features
  • 5 lab practical exercises
  • 18+ hours of premium self-paced video training
  • 900+ pages of ecourseware
  • Capstone Projects with Real-World CTF Challenges
  • Gain a year-long access to courseware and 6-month access to labs
  • Proctored exam voucher with one-year validity
  • Gain the globally recognized EC-Council’s certification
  • Acquire skills to identify, assess, select, build, and execute threat intelligence workflows
  • Enhance your relevancy in the job market

EC-Council Threat Intelligence Essentials (TIE) Course Information

Module 1: IoT Fundamentals

This module will introduce you to the basics of IoT and the different sectors where IoT is established.

Module 2: IoT Networking and Communication

This module will provide insights into the basics of networking concepts, the OSI Model, and the TCP Model. It will also cover the IEEE IoT Standards List.

Module 3: IoT Processors and Operating Systems

This module will help you understand the hardware devices, processors, and operating systems used in IoT.

Module 4: Cloud and IoT

This module will teach you about cloud computing, its characteristics, and the types of cloud services.

Module 5: IoT Advanced Topics

This module will brief you about web communications, mobile applications, and native applications.

Module 6: IoT Threats

This module will introduce you to some of the common IoT attacks, such as Mirai, BrikerBot, Sybii, and Blackhole attacks.

Module 7: Basic Security

This module will discuss the CIA triangle, Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and IoT security measures.

Module 8: Cloud Security

This module will discuss the state of cloud security, cloud vulnerabilities, NSA guidance, and secure cloud computing.

Module 9: Threat Intelligence

This module will start with the topic of the National Vulnerability Database, covering US Cert, Shodan, STRIDE, DREAD, PASTA, and CVSS.

Module 10: IoT Incident Response

This module will provide information on incident response in IoT, including standards, processes, procedures, tools, and indicators of compromise.

Module 11: IoT Security Engineering

This module will cover the 12 practices of the Microsoft Secure Development Lifecycle and Threat Modeling.

  • Gain insights into the emergence of the Internet of Things (IoT).
  • Learn about the devices that make your home a smart home.
  • Dive deep into IoT communication models.
  • Information security threats and vulnerabilities.
  • Gain a deep understanding of IoT networking and communication.
  • Understand cloud computing in depth.
  • Learn about the different types of threats to IoT.
  • School students, graduates, professionals, career starters and changers, IT / Technology / Cybersecurity teams with little or no work experience.
  • IT / Cybersecurity professionals, system administrators, cloud administrators, cybersecurity administrators, engineers, and architects will also benefit from this course.
  • Any professional involved in securing public, private, and hybrid cloud infrastructures, identities, data, and applications.
  • Anyone who wants to start a career in cybersecurity or threat intelligence.
  • Anyone interested in threat intelligence, Indicators of Compromise (IoC) analysis, defensive cybersecurity operations, and incident response.

Training Details: Self-paced in-demand lecture videos led by world-class instructors and hands-on labs.

Pre-requisite: No prior cybersecurity knowledge or IT work experience required.

Exam Details:

Exam Code: 112-58

Number of Questions: 75

Duration: 2 hours

Test Format: Multiple Choice

Secure Your Future in Cybersecurity !!!

  • 100% Discount on Training Fees
  • Tutor-Led Training at an Affordable Rate
  • 12-Month Access to Labs & Study Materials
  • Earn Globally Recognized EC-Council Certifications