What cyber threats might your company realistically face today? How will you orchestrate the resources at your disposal to defend against them? Cybersecurity Cases teaches you to take an active role in setting and participating in cybersecurity strategy within your organization. Through deep engagement with real-world case studies, you will learn to create an assessment strategy to optimize your capabilities and prioritize your spend; analyze the validity, value and reliability of threat intelligence; proactively detect and mitigate cyber risks when conducting new business initiatives and transactions; and effectively employ automation and orchestration.
Installment payments are now available on all course purchases!
No Mandatory Login Times
4-6 Work Hours Per Module
Your Subject Matter Expert:
Jeffrey Groman, CISSP
“You’ve been building and developing your cybersecurity team, and now you’re ready to optimize it. This course will open your eyes to the tactics of sophisticated threat groups and give you the advanced techniques and tools for defending against them.”
This advanced cybersecurity course is designed for learners who are familiar with the general concepts and frameworks that define the field and who want to gain hands-on experience putting them to use in specific situations. Dive deep into practical learning scenarios built from real-world examples of common types of cyberattacks and learn to effectively manage a budget to protect against cyber threats in multiple business contexts.
Module 1: Developing a Cyber Threat Intelligence Capability
Critically analyze and vet paid threat intelligence to be used in your company. Curate and package threat intelligence for business leaders. Develop a clear framework for assessing the reliability and validity of open-source intelligence.
Module 2: Advanced Case Study: FIN 7 Attack Group
Provide suggestions for resolving dilemmas in a case study on the topic of financially motivated attack groups. Predict the potential consequences of attacks on retail, restaurant and hospitality sectors. Identify the preliminary courses of action taken to infiltrate computer systems. Explain the consequences of the types of attacks launched by FIN 7.
Module 3: Advanced Assessment Strategies
Prioritize the evaluative criteria for assessing new and existing cybersecurity plans. Identify symptoms and warning signs of an attack early in the life cycle. Analyze the people, processes and technologies needed to build an internal red team function. Determine the best methods for revising and strengthening existing strategies.
Module 4: Advanced Case Study: Supply Chain Cyber Attack
Provide suggestions for resolving dilemmas in a case study on securing information and data. Predict the potential consequences of a supply chain cyber attack on a hypothetical company. Identify the preliminary courses of action taken to infiltrate computer systems. Explain the consequences of a supply chain attack.
Module 5: Automation and Orchestration
Identify repeatable processes for efficiency within your organization or industry. Identify the best methods for integrating and validating the strength of security tools within your automative process. Consider the people, processes and technologies for integrating security tools. List the steps for automating security processes and the procedures for detecting and resolving attacks.
Module 6: Advanced Case Study: Application Security eCommerce Attack
Decide how to resolve an application security attack. Predict the potential consequences of an application security eCommerce attack on a hypothetical company. Identify the preliminary courses of action taken to infiltrate computer systems. Explain the consequences of an eCommerce attack.
Module 7: Managing Cybersecurity Issues in the Mergers and Acquisitions Process
Summarize how to leverage resources (people, products, services, funds) for incorporating a cybersecurity plan into your new business initiative. Design a preventative strategy for ensuring the protection of customer data and information. Assess risk in a merger and acquisition transaction.
Module 8: Advanced Case Study: Critical Infrastructure Attack
Identify the preliminary courses of action taken to infiltrate computer systems. Explain the consequences of a critical infrastructure attack. Provide suggestions for recovering from a critical infrastructure attack on a company.
Jeffrey Groman, CISSP
Jeffrey Groman, founder of Groman Consulting Group, is dedicated to helping organizations identify and resolve their greatest cybersecurity risks. Mr. Groman has worked in the security field for more than 20 years. As a cybersecurity consultant, he has guided major corporations, including banks, insurance companies and software providers through risk prevention and rapid response to incidents and security breaches.
Mr. Groman is certified in forensic analysis and application security, and previously worked with Mandiant Security Consulting Services and FireEye, providing strategic and incident response consulting to security teams and educating executives through delivery of SOC assessments. In these roles, Mr. Groman led a team of consultants and functional experts in working with a wide range of clients across multiple verticals, including NYC Health and Hospitals, Blue Cross Blue Shield Association, Ameriprise Financial, American Express, Ally, Huntington National Bank, Eaton, Caterpillar, DST Systems, Sprint and TransAmerica.
Mr. Groman is passionate about cybersecurity and partnering with clients to find solutions to complex issues. His book “Avoid These 11 Pitfalls and Minimize the Pain of Your Next Data Breach” is designed to help organizations learn from his decades of real-world experience. He has presented at Information Systems Security Association (ISSA) International, NetSecure, and Infragard conferences; briefed boards of directors; conducted tabletop exercises and workshops; and helped clients build security processes to be better prepared for the inevitable.
Mr. Groman has a BS in Electrical and Computer Engineering from the University of Colorado, Boulder.