TESDA Cyber Threat Intelligence Analysis Level III Course

The Cyber Threat Intelligence Analysis Level III course by TESDA trains people in essential skills for collecting and analyzing cyber threat intelligence. This qualification enhances understanding and use of tools and methodologies in cyber intelligence.

Also read: TESDA Cyber Threat Monitoring Level I Course

Learners taking this course will develop skills to proficiently navigate complex cyber threats. The curriculum aims to deeply understand cyber intelligence, collection, and analysis, preparing participants for advanced cybersecurity roles.

TESDA Cyber Threat Intelligence Analysis Level III Course


Taking the Cyber Threat Intelligence Analysis Level III Course by TESDA offers several benefits:

  • Gain expertise in collecting and analyzing Cyber Threat Intelligence.
  • Learn to use various tools and methodologies effectively.
  • Enhance your ability to identify and mitigate cyber threats.
  • Improve your cybersecurity career prospects.
  • Stay ahead of emerging cyber threats and trends.

Career Options

A person with this Qualification can competently be:

  • Cyber Threat Intelligence Analyst
  • Cyber Threat Hunter
  • SOC Threat Intelligence Analyst

Units of Competency

This Qualification comprises the following Units of Competency:


  • Lead workplace communication
  • Lead small teams
  • Apply critical thinking and problem-solving techniques in the workplace
  • Work in a diverse environment
  • Propose methods of applying learning and innovation in the organization
  • Use information systematically
  • Evaluate occupational safety and health work practices
  • Evaluate environmental work practices
  • Facilitate entrepreneurial skills for micro-small-medium enterprises (MSMEs)


  • Apply quality standards
  • Perform Computer Operations


  • Plan cyber threat intelligence report
  • Collect and analyze cyber threat intelligence
  • Prepare cyber threat intelligence report

Sample of Certificate of Completion



To enroll in this course, you will need the following documents:

  1. PSA Birth Certificate
  2. High School or College Diploma
  3. Certified True Copy of Official Transcript of Records or Form 137
  4. Certificate of Good Moral Character or GMRC
  5. 1 x 1 and/or 2 x 2 pictures

To obtain further details, please reach out to the enrollment site that aligns with your requirements. Kindly note that the criteria may vary.

Also read: TESDA Cyber Threat Mitigation Level II Course

Frequently Asked Questions

1. Who can take this course?

A: This course is open to anyone interested in enhancing their cyber intelligence skills and knowledge.

2. Is there an age requirement for enrollment?

A: Yes, you must be at least 18 years old to enroll in this course.

3. Are there any prerequisites for this course?

A: It is recommended to have basic computer literacy skills before taking this course.

4. Is certification provided after completing the course?

A: Yes, a certificate of completion will be awarded to those who successfully complete all units of competency.

5. Is this recognized by employers?

A: Yes, this course is recognized and accredited by TESDA, making it a valuable addition to your resume for potential employers.

Video: New TESDA Courses 2024: Free Courses, Uniforms, and Allowances

If you are looking to enhance your skills and knowledge in a specific field, TESDA might have just what you need.

In this video, you ‘ll learn about the new TESDA courses that will be available in 2024. These courses not only offer valuable skills training, but they also come with some great benefits such as free tuition, uniforms, and allowances.


The Cyber Threat Intelligence Analysis Level III Course by TESDA is a comprehensive program that equips learners with advanced skills in cyber threat intelligence. With its focus on practical application and real-world scenarios, this course prepares individuals for various cybersecurity roles and enhances their career prospects. Enroll now to stay ahead of the ever-evolving cyber threats landscape and become a valuable asset in the field of cybersecurity.

error: Content is protected !!