CREST Practitioner Threat Intelligence Analyst Syllabus
CREST Practitioner Threat Intelligence Analyst Syllabus
Assessors Panel
CREST Practitioner Threat Intelligence Analyst Syllabus
This document and any information therein are confidential property of CREST and without infringement neither the
whole nor any extract may be disclosed, loaned, copied or used for manufacturing, provision of services or other
purposes whatsoever without prior written consent of CREST, and no liability is accepted for loss or damage from any
cause whatsoever from the use of the document. CREST retain the right to alter the document at any time unless a
written statement to the contrary has been appended..
Contents
1. Introduction ....................................................................................................... 4
1.1. Terms of reference............................................................................................................................. 4
3
1. Introduction
1.1. Terms of reference
The technical syllabus identifies at a high level the technical skills and knowledge that CREST expects candidates to
possess for the Practitioner Threat Intelligence Analyst Certification. The exam covers a common set of core skills and
knowledge as well as more specific role related areas.
Success at the CREST Practitioner Threat Intelligence Analyst (CPTIA) examination will confer CREST Practitioner
status to the individual.
A PTIA may be a comparatively junior member of a threat intelligence team, working under the direction of more senior
colleagues (CRTIA, CCTIM qualified personnel).
The candidate is expected to have a good breadth of knowledge in all areas of threat intelligence and demonstrable
understanding of collection and analysis activities.
The exam will assess the candidate’s understanding of the key phases of intelligence generation, cyber specific
information sources and common approaches to collection and analysis. The aim is to demonstrate a high level of
competence in the collection, analysis and dissemination of intelligence to a consistently high standard and in
accordance with legal and ethical guidelines.
4
2. Certification Examination Structure
2.1. CREST Practitioner Threat Intelligence Analyst (CPTIA)
The CPTIA Examination is a purely multiple-choice based exam.
The Notes for Candidates (NFC) document provides further information regarding the Certification Examinations in
general and the specific skill areas that will be assessed.
3. Syllabus Structure
The syllabus is divided into knowledge groups (Appendices A to F below), each of which is subdivided into specific skill
areas
5
4. Appendix A – Key Concepts
The key concepts underlying intelligence-led cyber threat assessments.
ID Skill Details
A1 Objectives of Threat Understand the key reasons why an organisation would want TI and how they would
Intelligence use it.
A2 Terminology Demonstrate familiarity with commonly used terms relating to TI and intelligence
processes.
A3 Threat Actor Types / Be able to distinguish between different threat actors and their likely objectives.
Definitions
A4 Threat Vector & Understand the definition of a threat vector, and demonstrate knowledge of key
Vulnerability Types threat vectors.
A5 The Intelligence Be able to name the stages of the cycle, and explain the key processes that occur at
Cycle each stage.
A6 Analytic Models Know the components of the Diamond Model, and understand the relationship
between them.
A7 Attack Lifecycle Understand the lifecycle of a typical attack, for example using a model such as the
“Cyber Kill Chain”.
A8 Understanding Risk Demonstrate an understanding of the relationship between threat, capability, intent,
and motivation.
6
5. Appendix B – Direction and Review
Understanding how the direction and review processes influence the analyst’s workflow.
ID Skill Details
B1 Developing Terms of Be able to list the elements included in a typical Terms of Reference.
Reference
Know why Terms of Reference are important to have before beginning a job.
B2 Importance of Project Be aware of the criteria used to assess intelligence output (for example Timeliness
Review / Accuracy / Presentation / Answering the IR etc.).
B3 Dealing with Know what an intelligence gap is, and how to identify one.
Intelligence Gaps
Be able to identify likely sources of information to fill an intelligence gap.
7
6. Appendix C – Data Collection
Collection of data relevant to a customer’s intelligence requirements and turning it into a format suitable for analysis.
ID Skill Details
C1 Function & Use of a Know the key component parts of a collection plan and be able to interpret it
Collection Plan effectively.
C3 Types of Sources Understand different types of source and their broad classifications (HUMINT,
OSINT, etc.).
C4 Source Reliability and The ability to interpret source reliability grading / information reliability grading
Grading (based on the UK 5x5x5 model).
C5 Specific Sources Know what information can be obtained from typical technical sources such as
WHOIS, DNS, malware analysis, social media, document metadata etc.
C6 Boolean Search Ability to combine Boolean operators to form a precise search, as used by many
Strings search engines and proprietary products.
C7 Basic Source Understand reasons why some online sources are likely to be biased / inaccurate.
Analysis
C8 Operational Security Understand requirement for OPSEC and potential implications of failure.
(OPSEC)
Knowledge of anonymization tools such as Tor and i2p.
Understand the requirement to separate personal web use from work collection.
Know the appropriate course of action in the event of an OPSEC breach.
8
7. Appendix D – Data Analysis
Understanding common approaches to analysis and potential pitfalls.
ID Skill Details
D1 Hypothesis Testing Ability to outline steps required to prove / disprove a hypothesis.
D3 Expressing Likelihood Understand applicability of terms such as ‘possible’, ‘likely’ and ‘highly likely’.
/ Certainty
D4 Circular Reporting Know what circular reporting is, and suggest ways in which it can be avoided.
D5 Cognitive Biases Identify some of the major types of bias that can affect intelligence analysis.
• A network diagram
• A timeline
• A histogram
• A scatterplot
• A time series graph
9
8. Appendix E – Product Dissemination
Methods for disseminating intelligence product to consumers and for sharing intelligence with trusted members of the
wider intelligence community.
ID Skill Details
E1 Structured / Machine Knowledge of STIX, CYBOX and TAXII and how they relate to each other.
Readable TI
Knowledge of the content and format of different types of STIX message.
E2 Unstructured / Human Understanding of the key advantages / disadvantages of spoken and written
Readable TI dissemination.
10
9. Appendix F – Legal and Ethical
Legal and ethical considerations arising from conducting intelligence-led engagements.
ID Skill Details
Demonstrate the correct course of action in the event of a breach of GPMS handling.
F4 Dealing With Legal / Know appropriate action if given a task of questionable legality / ethics.
Ethical Uncertainty.
11
Telephone: +44 (0)20 3058 3122
General enquiries: [email protected]
Membership: [email protected]
Examinations: [email protected]
Press / Public Relations: [email protected]
www.crest-approved.org