Cybersecurity Awareness

White image with gray geographic symbols
Cybersecurity Discipline Icon
Cybersecurity Discipline:

Cybersecurity Awareness

Thrown in the deep end of cybersecurity without sufficient training? This Mandiant course introduces students to foundational elements of cybersecurity programs, including security governance to establish a security framework and ways to align the security program with business objectives. You'll learn to identify common attacker methodologies, and how an attacker enters, persists, and exfiltrates data from an organization via the attack lifecycle. Establish governance that will provide guidance and oversight to your cybersecurity program and assess its risks.

4 modules (self-paced)
Next Start
Continuous Enrollment

Installment payments are now available on all course purchases!

Knowledge Areas

Security architecture
Attacker methodologies
Establishing cybersecurity governance
Risk assessment framework
Attack lifecycle
Strategic planning
Computer monitor icon with blue arrow

100% Online

Geometric clock icon

No Mandatory Login Times

List icon with blue check marks

4 Modules

Paper icon with blue pencil

4-6 Work Hours Per Module

digital badge for Cybersecurity Awareness from EmergingEd powered by FireEye

Digital Badge

Jessica Hays

Your Subject Matter Expert:

Jessica Hays

“Cyber defense and the attacker life cycle start in many different forms. It’s not every day that you get a spear-phishing email, or an indicator of compromise, or an alert on your sim that says, hey, something bad is happening. Sometimes it’s something as innocuous as a phone call.”

Course Modules

This cybersecurity course provides an overview of cybersecurity threats and the fundamentals of a robust cybersecurity program, enabling you to understand how threat actors see their targets and learn methods to help mitigate risks. Designed for both non-technical and technical learners, this course covers security risk management, measurement and communications. Join Mandiant experts in an exploration of security architecture topics addressing conventional security practices and tools used to monitor and protect mature organizations.

Module 1: Governance

Draft a mission statement for an InfoSec governance program and create metrics for a reporting dashboard given a specific project. Analyze the components of an effective policy and recognize the impact of budgeting in program decision-making and prioritization. Design a workforce management plan, which includes security awareness training, education, professional development and skills matrix. Identify your regulatory compliance requirements and your ability to audit compliance with those requirements.

Module 2: Security Risk Management

Describe how an enterprise risk management team functions according to its organization's threat profile. Explain the function of a risk management framework and its components. Define vulnerability management and cybersecurity insurance and describe the steps of a risk analysis. Assess the risk to your organization given a report of a vulnerability.

Module 3: Security Architecture

Summarize database security best practices, application monitoring and management best practices. Explain mobile device management policies as well as host and endpoint protection management. Review network, cloud and data protection best practices and describe best practices for configuring network security monitoring. Summarize remote access best practices, safeguards for physical data center security and cloud security best practices. Discuss key indicators of good data center security.

Module 4: Cyber Defense

Explain the purpose and components of an incident response plan and summarize incident prevention best practices as they relate to the incident response plan. Develop a use case for threat detection and list security monitoring logging sources. Describe key components of an incident response playbook and processes for incident containment and remediation. Explain the features of threat intelligence and its advantages over monitoring raw data, then describe how to measure and report key metrics.

Ready to redefine your future?

Get started with EmergingEd today.

Jessica Hays

Jessica Hays is a Technical Instructor at Mandiant. With 13 years of experience in the cybersecurity field, she has worked in a variety of capacities, including incident response and handling, but is currently specializing in cybersecurity awareness through proactive measures and threat intelligence. During her career, she has worked with multiple Fortune 500 and 1000 companies, along with various U.S. Government intelligence agencies.

David Bean

David Bean is a Senior Consultant at Mandiant, a FireEye company. With more than 20 years of experience in information security and related technology, he has worked with internet service providers, higher education institutions, as well as working in the healthcare industry. His varying positions have included network engineer and architect, system administrator, security analyst and security awareness trainer among others. Bean holds a Bachelor of Science Degree in Mechanical Engineering from the University of Tennessee at Knoxville and enjoys presenting on security related topics at local industry events.

Brad Curtis

Brad Curtis is a Principal Consultant and cybersecurity subject matter expert with more than 15 years of information security experience. He joined Mandiant in July 2017, where he provides expertise to clients in the design, implementation and continuous improvement of information security programs. Before joining Mandiant, Mr. Curtis led information security programs in the healthcare and health insurance industries for over 12 years. He has a technical background in networking and operating system administration, both on Windows and Linux/UNIX platforms. He has a thorough understanding of malware, computer forensics, and tactics, techniques and procedures leveraged by attackers.