Skip to main content

“You’ve been building and developing your cybersecurity team, and now you’re ready to optimize it. This course will open your eyes to the tactics of sophisticated threat groups and give you the advanced techniques and tools for defending against them.”

-Jeffrey Groman, CISSP, Cybersecurity Cases SME

Examples of Cybersecurity Cases

Cybersecurity Cases

What cyber threats might your company realistically face today? And how will you orchestrate the resources at your disposal to defend against them?

Cybersecurity Cases teaches you to take an active role in setting and participating in cybersecurity strategy within your organization. Through deep engagement with real-world case studies, you will learn to create a strategic assessment strategy to optimize your capabilities and prioritize your spend; analyze the validity, value and reliability of threat intelligence; proactively detect and mitigate cyber risks when conducting new business initiatives and transactions; and effectively employ automation and orchestration.

Knowledge Areas

Open-source intelligence • FIN 7 attack groups • Red teams and blue teams • Automation and orchestration • Budgeting for cybersecurity • Critical infrastructure security

The Details

percent icon

100% Online

timer icon

No Mandatory Login Times

calendar icon

8 Modules

pencil and paper icon

4-6 Hours of Work per Module

credit card icon


Course Details

This advanced cybersecurity course is designed for learners who are familiar with the general concepts and frameworks that define the field and who want to gain hands-on experience putting them to use in specific situations. Dive deep into practical learning scenarios built from real-world examples of common types of cyberattack and learn to effectively manage a budget to protect against cyber threats in multiple business contexts.

The Cybersecurity Cases course covers the following topics over eight instructional modules:

  • Module 1: Advanced Assessment Strategies
  • Module 2: Automation and Orchestration
  • Module 3: Developing a Threat Intelligence Capability
  • Module 4: Managing Cybersecurity Issues in Mergers and Acquisitions
  • Module 5: Advanced Case Study: Supply Chain Cyberattack
  • Module 6: Advanced Case Study: Application Security eCommerce Attack
  • Module 7: Advanced Case Study: Critical Infrastructure Attack
  • Module 8: Advanced Case Study: FIN 7 Attack Group
Jeffrey Groman

Your Subject-Matter Expert:

Jeffrey Groman, CISSP

Jeffrey Groman, founder of Groman Consulting Group, is dedicated to helping organizations identify and resolve their greatest cybersecurity risks. Mr. Groman has worked in the security field for more than 20 years. As a cybersecurity consultant, he has guided major corporations, including banks, insurance companies and software providers through risk prevention and rapid response to incidents and security breaches.

Mr. Groman is certified in forensic analysis and application security, and previously worked with Mandiant Security Consulting Services and FireEye, providing strategic and incident response consulting to security teams and educating executives through delivery of SOC assessments. In these roles, Mr. Groman led a team of consultants and functional experts in working with a wide range of clients across multiple verticals, including NYC Health and Hospitals, Blue Cross Blue Shield Association, Ameriprise Financial, American Express, Ally, Huntington National Bank, Eaton, Caterpillar, DST Systems, Sprint and TransAmerica.

Mr. Groman is passionate about cybersecurity and partnering with clients to find solutions to complex issues. His book “Avoid These 11 Pitfalls and Minimize the Pain of Your Next Data Breach” is designed to help organizations learn from his decades of real-world experience. He has presented at Information Systems Security Association International (ISSA), NetSecure, and Infragard conferences; briefed boards of directors; conducted tabletop exercises and workshops; and helped clients build security processes to be better prepared for the inevitable.

Mr. Groman has a BS in Electrical and Computer Engineering from the University of Colorado, Boulder.