PROGETA
Technologies
000
LAUNCHPAD → TRACKS → T-01 T-01

Cyber Threat Intelligence (CTI) Specialist

Monitor adversary behaviour. Predict attacks before they happen.

You will collect intelligence from open-source and dark web environments, profile threat actor groups, map attack infrastructure, and produce written intelligence reports that allow security teams to act before a breach occurs. This track is built around OSINT methodology and threat modelling.

DURATION 6 Months
LEVEL Mid Level
FORMAT Hybrid (Campus + Self-Directed)
MODULES 8 Technical + 4 Professional
CREDENTIAL Progeta Technologies Certified CTI Specialist
STATUS ● Enrolling Now
WHAT YOU WILL LEARN

Competencies you will build.

Open Source Intelligence Systematic collection of intelligence from public sources including social media, technical databases, and dark web forums.
Dark Web Navigation Safe operating procedures for monitoring threat actor forums, marketplaces, and communication channels.
Threat Actor Profiling Building structured profiles of adversary groups: motivations, capabilities, tactics, and infrastructure.
Malware Analysis Static and dynamic analysis of malicious code to understand its purpose, origin, and indicators.
Intelligence Reporting Writing actionable intelligence reports for security teams and executive audiences.
IoC Development Creating detection rules and signatures from real threat intelligence.
WHAT'S INSIDE

Modules in this track.

This track draws from the following modules in the LaunchPad catalog. Each module is a focused unit of instruction with practical exercises.

PHASE 01 Phase 1: The Foundation (Month 1)
M01 Cybersecurity Fundamentals (CIA Triad, Risk) TECHNICAL
M02 Linux Operations & Command Line (The OS of the web) TECHNICAL
M03 Computer Networking & TCP/IP (How data moves) TECHNICAL
M04 Critical Thinking (Analyzing data without bias) PROFESSIONAL
PHASE 02 Phase 2: Intelligence Tradecraft (Months 2-3)
M01 OSINT (Open Source Intelligence) TECHNICAL
M02 Digital Footprinting & Reconnaissance TECHNICAL
M03 Dark Web Operations (Tor, I2P) TECHNICAL
M04 Operational Security (OpSec) & Anonymity TECHNICAL
M05 Report Writing for Executives (Turning intel into value) PROFESSIONAL
PHASE 03 Phase 3: Advanced Analysis (Months 4-5)
M01 Indicators of Compromise (IoC) Discovery TECHNICAL
M02 Malware Analysis Fundamentals (Knowing the enemy) TECHNICAL
M03 Geopolitical Risk Analysis (Nation-state actors) TECHNICAL
M04 Analytical Problem Solving (Connecting the dots) PROFESSIONAL
PHASE 04 Phase 4: Career Launch (Month 6)
M01 Cyber Warfare Tactics (Strategic view) TECHNICAL
M02 Resume Building & Optimization PROFESSIONAL
M03 Interview Preparation & Mock Sessions PROFESSIONAL
View all modules in the catalog →
PREREQUISITES

What you need before you start.

  • Basic computer literacy.
  • No cybersecurity background required.
  • Curiosity about geopolitics and threat landscapes is an advantage.
WHO THIS IS FOR

This track is right for you if...

  • Students interested in geopolitics, journalism, research, or intelligence analysis.
  • Students who want to work in government, consulting, or financial sector security.

Ready to start?

Enrollment is done through direct contact. We will confirm availability and walk you through the first steps.

ASK A QUESTION →