Skip to main content
Bildux Logo
EC-Council Threat Intelligence Essentials (TIE) logo

EC-Council Threat Intelligence Essentials (TIE)

Foundation

The T|IE course provides a foundational introduction to cybersecurity threat intelligence. You learn what threat intelligence is, how it differs from raw data or information, and why it matters for modern security operations.

1Providers
View EC-Council

Description

The T|IE course provides a foundational introduction to cybersecurity threat intelligence. You learn what threat intelligence is, how it differs from raw data or information, and why it matters for modern security operations. The training introduces key concepts such as the lifecycle of threat intelligence, types of threat intelligence (strategic, operational, tactical, technical), sources and methods of data collection, use of Threat Intelligence Platforms (TIPs), and basic analysis and reporting techniques. The course combines theory with practical labs and a final capstone project (Capture-the-Flag style), giving hands-on experience for real-world scenarios.

No sessions available

Check back later or contact a provider directly.

What You Will Learn

This training introduces the core concepts of threat intelligence and helps you understand how intelligence supports detection, response and security decision making. The course includes theory, hands-on labs and a final capstone challenge.

Part 1: Introduction to threat intelligence, basic terminology, how threat intelligence works and why organisations use it

Part 2: Types of threat intelligence, including strategic, operational, tactical and technical intelligence

Part 3: Threat landscape fundamentals, common cyber threats, threat actors and attack trends

Part 4: Sources of threat intelligence and data collection methods, including open-source intelligence

Part 5: Threat Intelligence Platforms (TIPs) and how they help collect, organise and analyse intelligence

Part 6: Threat intelligence analysis, data enrichment, threat profiling and turning raw data into actionable insights

Part 7: Applying threat intelligence to threat hunting and detection activities

Part 8: Sharing and collaborating on threat intelligence within communities and organisations

Part 9: Integrating threat intelligence into incident response processes to improve detection and recovery

Part 10: Capstone labs and final challenge to apply learned concepts in a practical scenario

Certification & Exam

After completing the T|IE training, you can take the Threat Intelligence Essentials certification exam. The exam checks your understanding of core threat intelligence concepts, the intelligence lifecycle and how intelligence supports detection, analysis and incident response.

The exam consists of multiple choice questions and is delivered online through an approved EC-Council exam platform. The passing score is determined by EC-Council’s cut-score method, which means the exact percentage may vary depending on the exam form.

There are no prerequisites to sit for the exam, making it suitable for beginners or anyone entering the field of threat intelligence. Once you pass, you earn the T|IE certificate, confirming your foundational knowledge in threat intelligence and its practical use in security operations.

What You Will Achieve

By the end of the course, you will be able to:

  • understand the core concepts of threat intelligence and how it supports security operations

  • distinguish between strategic, operational, tactical and technical intelligence

  • analyse the current threat landscape and identify common threat actors and attack patterns

  • collect threat data from reliable sources, including open-source intelligence

  • use Threat Intelligence Platforms to organise, enrich and interpret intelligence

  • turn raw data into actionable insights through structured analysis techniques

  • apply intelligence to threat hunting and early detection activities

  • support incident response teams with relevant intelligence during investigations

Training Providers

1 provider

FAQs

TIE is an entry-level course about cyber threat intelligence. It explains how threat intelligence is collected, analyzed, and used to support security decisions.

Inhouse Training

Get Custom In-house Training

Post once, get competitive offers from multiple providers. Choose the one that fits your team.

Customized to your team's needsCompetitive offers from multiple providersFlexible scheduling and location
Request Offers

Similar Trainings

EC Council Certified Ethical Hacker Certification (CEH)

The Certified Ethical Hacker (CEH) course teaches participants how to identify and fix security vulnerabilities. Through hands-on labs and theory, learners use attacker tools to test and strengthen network security. The training covers networks , web applications , cloud , mobile , and IoT systems. Participants develop technical skills for security audits and vulnerability assessments. Upon completion, professionals can perform penetration testing and report security gaps to protect systems from exploitation.

View Details0 sessions

EC-Council Certified Penetration Testing Professional (CPENT)

The Certified Penetration Testing Professional (CPENT ) program is the world’s most comprehensive guided penetration testing program. It offers a complete hands-on pentesting methodology and AI techniques mapped to all pentesting phases. CPENT enables you to master pentesting within an enterprise network environment, evaluating intrusion risks and compiling actionable, structured reports. Distinguish yourself with the CPENT , learning beyond technical knowledge, scoping engagements, understanding design, estimating effort, and presenting findings and thrive as a leader in offensive security with versatile skills. CPENT combines guided learning with hands-on practice while immersing you in diverse live scenarios involving IoT systems, segmented networks, and advanced defenses, with practical challenges mapped to each domain. Gain expertise in advanced skills necessary to create your tools, conduct advanced binary exploitation, double pivot, customize scripts, and write your exploits to penetrate the deepest pockets of the network. Hands-on course featuring CTFs, 110+ labs, live cyber ranges, and 50+ tools Practical exam tests skills on unique multi-disciplinary network ranges The only program to teach a complete pen testing methodology

View Details0 sessions

EC-Council Computer Hacking Forensic Investigator (CHFI)

EC-Council’s CHFI program enabled cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and accomplish forensic readiness. Master the methodological approach of forensics process, evidence handling procedures, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence, legal procedures to ensure it is admissible in court. Build skills beyond traditional hardware and memory forensics and with cloud forensics, mobile and IoT, investigating web application attacks, and malware forensics. CHFI equips you with skills to validate/triage incidents and guide the incident response teams. Build job ready skills on immersive 68 forensic labs Earn globally recognized and demanded by employers Flexible learning options without quitting your current jobs

View Details0 sessions

EC-Council Certified Network Defender (CND) Program

The CND course gives you a full introduction to network security from a defender’s perspective. You learn how to protect, monitor, detect and respond to threats in modern network environments. The training includes theory and hands-on labs , teaching you how to secure networks, configure firewalls and IDS/IPS, monitor traffic, and implement defensive strategies across devices, endpoints, cloud and IoT. The goal is to equip you to build and maintain secure networks for organisations.

View Details0 sessions

EC-Council Certified Cloud Security Engineer (CCSE)

The CCSE course teaches you how to secure, manage and defend cloud environments. You learn both general cloud-security principles and specific skills for major providers such as AWS, Azure and GCP. The training includes hands-on labs, real-world scenarios, and guidance on cloud governance, compliance, monitoring and incident response. This course prepares you to build secure cloud infrastructures , protect data and services in multi-cloud settings , and respond to cloud-specific threats professionally.

View Details0 sessions

EC-Council Certified DevSecOps Engineer (ECDE)

The ECDE course shows you how to combine development, operations and security in a modern workflow. You learn both cloud-native and on-prem security practices, secure coding, infrastructure hardening, automated security tools and continuous deployment pipelines. The training uses many hands-on labs to build real-world DevSecOps skills.

View Details0 sessions