Thrown in the deep end of cybersecurity without sufficient training? This Mandiant course introduces students to foundational elements of cybersecurity programs, including security governance to establish a security framework and ways to align the security program with business objectives. You'll learn to identify common attacker methodologies, and how an attacker enters, persists, and exfiltrates data from an organization via the attack lifecycle. Establish governance that will provide guidance and oversight to your cybersecurity program and assess its risks.
4 modules (self-paced)
Installment payments are now available on all course purchases!
No Mandatory Login Times
4-6 Hours of Work per Module
Your Subject Matter Expert:
“Cyber defense and the attacker life cycle start in many different forms. It’s not every day that you get a spear-phishing email, or an indicator of compromise, or an alert on your sim that says, hey, something bad is happening. Sometimes it’s something as innocuous as a phone call.”
This cybersecurity course provides an overview of cybersecurity threats and the fundamentals of a robust cybersecurity program, enabling you to understand how threat actors see their targets and learn methods to help mitigate risks. Designed for both non-technical and technical learners, this course covers security risk management, measurement and communications. Join Mandiant experts in an exploration of security architecture topics addressing conventional security practices and tools used to monitor and protect mature organizations.
Module 1: Governance
Draft a mission statement for an InfoSec governance program and create metrics for a reporting dashboard given a specific project. Analyze the components of an effective policy and recognize the impact of budgeting in program decision-making and prioritization. Design a workforce management plan, which includes security awareness training, education, professional development and skills matrix. Identify your regulatory compliance requirements and your ability to audit compliance with those requirements.
Module 2: Security Risk Management
Describe how an enterprise risk management team functions according to its organization's threat profile. Explain the function of a risk management framework and its components. Define vulnerability management and cybersecurity insurance and describe the steps of a risk analysis. Assess the risk to your organization given a report of a vulnerability.
Module 3: Security Architecture
Summarize database security best practices, application monitoring and management best practices. Explain mobile device management policies as well as host and endpoint protection management. Review network, cloud and data protection best practices and describe best practices for configuring network security monitoring. Summarize remote access best practices, safeguards for physical data center security and cloud security best practices. Discuss key indicators of good data center security.
Module 4: Cyber Defense
Explain the purpose and components of an incident response plan and summarize incident prevention best practices as they relate to the incident response plan. Develop a use case for threat detection and list security monitoring logging sources. Describe key components of an incident response playbook and processes for incident containment and remediation. Explain the features of threat intelligence and its advantages over monitoring raw data, then describe how to measure and report key metrics.
Network Traffic Analysis
This Mandiant course provides hands-on, tactical experience with network protocols, network architecture, intrusion detection systems, network traffic capture and traffic analysis. Reinforce technical...
Windows Enterprise Incident Response
What does crime scene investigation look like if the scene is virtual? This Mandiant course teaches the fundamental investigative techniques you need to...
What cyber threats might your company realistically face today? How will you orchestrate the resources at your disposal to defend against them? Cybersecurity Cases teaches...
Cybersecurity Foundations and Frameworks
In our volatile digital world, the cyber threats you don’t know about are the most dangerous ones there are. Cybersecurity Foundations and Frameworks...
Jessica Hays is a Technical Instructor at Mandiant. With 13 years of experience in the cybersecurity field, she has worked in a variety of capacities, including incident response and handling, but is currently specializing in cybersecurity awareness through proactive measures and threat intelligence. During her career, she has worked with multiple Fortune 500 and 1000 companies, along with various U.S. Government intelligence agencies.
David Bean is a Senior Consultant at Mandiant, a FireEye company. With more than 20 years of experience in information security and related technology, he has worked with internet service providers, higher education institutions, as well as working in the healthcare industry. His varying positions have included network engineer and architect, system administrator, security analyst and security awareness trainer among others. Bean holds a Bachelor of Science Degree in Mechanical Engineering from the University of Tennessee at Knoxville and enjoys presenting on security related topics at local industry events.
Brad Curtis is a Principal Consultant and cybersecurity subject matter expert with more than 15 years of information security experience. He joined Mandiant in July 2017, where he provides expertise to clients in the design, implementation and continuous improvement of information security programs. Before joining Mandiant, Mr. Curtis led information security programs in the healthcare and health insurance industries for over 12 years. He has a technical background in networking and operating system administration, both on Windows and Linux/UNIX platforms. He has a thorough understanding of malware, computer forensics, and tactics, techniques and procedures leveraged by attackers.