Skip to main content

"You're not sure if the hooded hacker goblins actually exist, but you've read about too many breaches in recent years to dismiss them entirely. This course will help you separate fact from fiction."

-Jeffrey Groman, CISSP, Cybersecurity Foundations and Frameworks SME

Cybersecurity Foundations and Frameworks

In our volatile digital world, the cyber threats you don’t know about are the most dangerous ones there are.

Cybersecurity Foundations and Frameworks teaches you to assess where your organization sits amid the cyber threat landscape and to identify risks, threats and vulnerabilities associated with your industry. Through practical learning scenarios rooted in real-world examples, this cybersecurity course teaches you to prioritize the most effective elements of security frameworks for your organization and to manage cybersecurity frameworks within the context of industry compliance regulations.

Knowledge Areas

Internet of things (IOT) cybersecurity • Industry-specific cyber threats • Commonly targeted assets • Security functions (network, host, application, data) • Attack lifecycles • Tactics, techniques and procedures (TTPs) of cyber threats • Compliance with cybersecurity legal frameworks

The Details

percent icon

100% Online

timer icon

No Mandatory Login Times

calendar icon

8 Modules

pencil and paper icon

4-6 Hours of Work per Module

credit card icon


Course Details

This foundational cybersecurity course is designed to provide you with a breadth of practical knowledge about the cybersecurity risks businesses typically face today and strategies for identifying and mitigating those risks. Learn how to work closely and strategize with the technical members of your team to ensure your company is proactive toward and protected against any threat that may arise.

The Cybersecurity Foundations and Frameworks course covers the following topics over eight instructional modules:

  • Module 1: The Threat Landscape
  • Module 2: Types of Attacks and Cybersecurity Risks
  • Module 3: Countermeasures and Security Measures
  • Module 4: Identifying Cyber Threats and the Attack Lifecycle
  • Module 5: Attacker Motivations
  • Module 6: NIST Cybersecurity Framework
  • Module 7: Legal and Compliance Aspects of Cybersecurity
  • Module 8: Examining Your Organization
Jeffrey Groman

Your Subject-Matter Expert:

Jeffrey Groman, CISSP

Jeffrey Groman, founder of Groman Consulting Group, is dedicated to helping organizations identify and resolve their greatest cybersecurity risks. Mr. Groman has worked in the security field for more than 20 years. As a cybersecurity consultant, he has guided major corporations, including banks, insurance companies and software providers through risk prevention and rapid response to incidents and security breaches.

Mr. Groman is certified in forensic analysis and application security, and previously worked with Mandiant Security Consulting Services and FireEye, providing strategic and incident response consulting to security teams and educating executives through delivery of SOC assessments. In these roles, Mr. Groman led a team of consultants and functional experts in working with a wide range of clients across multiple verticals, including NYC Health and Hospitals, Blue Cross Blue Shield Association, Ameriprise Financial, American Express, Ally, Huntington National Bank, Eaton, Caterpillar, DST Systems, Sprint and TransAmerica.

Mr. Groman is passionate about cybersecurity and partnering with clients to find solutions to complex issues. His book “Avoid These 11 Pitfalls and Minimize the Pain of Your Next Data Breach” is designed to help organizations learn from his decades of real-world experience. He has presented at Information Systems Security Association International (ISSA), NetSecure, and Infragard conferences; briefed boards of directors; conducted tabletop exercises and workshops; and helped clients build security processes to be better prepared for the inevitable.

Mr. Groman has a BS in Electrical and Computer Engineering from the University of Colorado, Boulder.