joudy ahmed
has successfully completed the Threat Intelligence Fundamentals for SOC Analysts (CTI 101) course, demonstrating a strong foundational understanding of cyber threat intelligence principles. The course covered core concepts, lifecycle, tools, analysis, threat actor profiling, and enhancing incident response and threat hunting.
This certifies that
CERTIFICATE of Completion
Harun Seker
Emrah Alpa
Sr. Solution Engineer
CTIA Certified Instructor
Sr. Technical
Enablement Manager
Scan to Verify
b2e060ca-a3a9-4177-935a-ee13866f58b9
2025-05-08
Threat Intelligence Fundamentals for SOC Analysts

Distributed by:

JA

Issued to

joudy ahmed

Want to report a typo or a mistake?

Credential Verification

Issue date: May 8, 2025

ID: b2e060ca-a3a9-4177-935a-ee13866f58b9

SOCRadar logo

Issued by

VERIFIED

SOCRadar

VERIFIED

Threat Intelligence enriched with External Attack Surface Management, Supply Chain, and Digital Risk Protection Services

Type

Course

Level

Foundational

Format

Online

Price

Paid

Description

Threat Intelligence Fundamentals for SOC Analysts (CTI 101) is a comprehensive training program designed to equip security professionals with the fundamental knowledge and practical skills required to understand and utilize cyber threat intelligence.

To earn this certification, the recipient demonstrated proficiency in:
• The fundamentals of cyber threat intelligence, its importance, and its applications in cybersecurity
• The intelligence lifecycle, including collection, analysis, and dissemination of threat data
• Identifying and classifying cyber threats based on real-world attack patterns
• Understanding the role of threat intelligence in Security Operations Centers (SOCs)
• Using intelligence to enhance proactive defense strategies
• Working with frameworks such as MITRE ATT&CK, the Cyber Kill Chain, and STIX/TAXII

Skills

Threat Intelligence Analysis

SOC Operations & Incident Response

Earning Criteria

Test

By achieving this certification, recipients have demonstrated their ability to apply intelligence-driven security operations, making them valuable assets in the field of cybersecurity.