CREST Registered Threat Intelligence Analyst
The CREST Registered Threat Intelligence Analyst (CRTIA) examination is aimed at individuals who are part of a team delivering threat intelligence services. A minimum of two years’ experience collecting, analysing and documenting threat intelligence is expected.
The CR TIA qualification provides assurance that an individual has reached the appropriate standard as a threat intelligence team member to deliver safe, legal and ethical services.
The examination consists of a multiple choice paper. Candidates are required to meet or exceed a two-thirds pass mark in the multiple choice paper. Success will confer Registered status to the individual.
The examination will consist of two components:
- a multiple-choice paper; and
- a selection of long form questions that require detailed written answers.
You can download the following documents from the links below:
CREST Registered Threat Intelligence Analyst Syllabus
CREST Registered Threat Intelligence Analyst Examination Notes for Candidates
The CREST Registered Threat Intelligence Analyst examination costs £395 + VAT. The examination is delivered at Pearson Vue test centres.
Recommended Preparation Material
The following material and media has been cited as helpful preparation for this examination by previous candidates:
Crucial Academy – CREST Approved Training Provider
The following list is not exhaustive and CREST has not verified any of the resources for accuracy:
Farnham, G. (2013). Tools and standards for cyber threat intelligence projects. The SANS Institute.
Poputa-Clean, P. (2015). Automated Defense – Using Threat Intelligence to Augment Security. The SANS Institute.
Lawson, C. and McMillan, R. (2014). Technology overview for machine-readable threat intelligence. Gartner, Inc.
Cabinet Office (2016). National cyber security strategy 2016-21. Crown Copyright.
Marinos, L. (2019). ENISA Threat Landscape 2018. European Union Agency for Network and Information Security (ENISA).
Heuer, R. (1999). Psychology of intelligence analysis. Center for the Study of Intelligence, CIA.
KPMG (2013). Cyber threat intelligence and the lessons from law enforcement. KPMG International Cooperative.
Holland, R. (2013). Five steps to building an effective threat intelligence capability. Forrester Research, Inc.
Mitre (2018c). ATT&CK Resources. Retrieved from https://attack.mitre.org/resources/. The MITRE Corporation.
ACPO (2007). Practical Advice: Introduction to Intelligence-Led Policing. ACPO Centrex.
Caltagirone, S. et al (2013). The Diamond Model of Intrusion Analysis. ThreatConnect.
Bazzell, M. (2018). Open Source Intelligence Techniques. CCI Publishing.
Moore, David T., (2007). Critical Thinking and Intelligence Analysis. National Defense Intelligence College Occasional Paper #14.
Butterfield, A. (1993). The Accuracy of Intelligence Assessment. United States Naval War College.
Wheaton, K et al. (2006). Structured Analysis of Competing Hypotheses. Strategic and Competitive Intelligence Professionals (SCIP).
Dartnall, R. (2018). Intelligence Preparation of the Cyber Environment. Retrieved from: https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1517245731.pdf. SANS.
Dartnall, R. (2017). The use of conventional intelligence methodologies in Cyber Threat Intelligence. Retrieved from: https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1492113006.pdf. SANS.
CTIPs (2019). What is Cyber Threat Intelligence and how is it used?
Bank of England (2016): CBEST Intelligence-Led Testing, CBEST Implementation Guide. Version 2.0. Retrieved from: https://www.bankofengland.co.uk/-/media/boe/files/financial-stability/financial-sector-continuity/cbest-implementation-guide
European Central Bank (2018): Tiber-EU Framework. How to implement the European framework for Threat Intelligence-based Ethical Red Teaming. Retrieved from: https://www.ecb.europa.eu/pub/pdf/other/ecb.tiber_eu_framework.en.pdf
Bertram, S (2017): F3EAD: Find, Fix, Finish, Exploit, Analyze and Disseminate – The Alternative Intelligence Cycle. Retrieved from: https://www.digitalshadows.com/blog-and-research/f3ead-find-fix-finish-exploit-analyze-and-disseminate-the-alternative-intelligence-cycle/
Definitive Guide to Cyber Threat Intelligence (by Jon Friedman/Mark Bouchard)
Psychology of Intelligence Analysis (by Richards J. Heure Jr)
Useful Information for Candidates
How to book
Details of the Logistics and Timings of CREST examinations can be found in the Examination Preparation pages for your country of choice
CREST’s Policy for Candidates requiring special arrangements including additional time to accommodate a medical condition (including examinations delivered via Pearson Vue)
Terms and Conditions for CREST Examinations (includes hard disk drive wiping policy)