Mandiant introduces on-demand cyber intelligence training

Mandiant introduces on-demand cyber intelligence training

Share post

Mandiant introduces on-demand cyber intelligence training. The new training includes industry-leading threat intelligence reporting and real-world application scenarios from experienced Mandiant experts.

FireEye, the intelligence-based security company, announces the launch of Mandiant On-Demand Cyber ​​Intelligence Training. Due to the steadily increasing number of cyber attacks, companies of all sizes are faced with the constant challenge of attracting and retaining talent and experts from the security sector. Today's security leaders need to rethink how they develop these talents.

Further training of security talents

With new training methods, for example, specialist knowledge about cyber threats can be built up in one's own company. The Mandiant On-Demand Cyber ​​Intelligence Training therefore focuses on training security teams in the practical application of threat intelligence concepts - across different use cases from different industries in order to develop a wide range of skills.

“The combination of a shortage of cybersecurity experts and a rapidly changing cyber threat landscape makes training an indispensable component, especially in the area of ​​threat intelligence,” says Sandra Joyce, Executive Vice President and Head of Mandiant Threat Intelligence. “That is the main reason we decided to develop an in-depth training program. This enables us to offer our customers the support they need to protect critical systems and data from ever-evolving threats. "

On demand and online

Many security officers lead teams distributed around the world, whose members cannot simply travel to the site for training courses. Mandiant On-Demand Cyber ​​Intelligence Training gives security and risk managers the flexibility to support the onboarding of new security analysts and encourage the retention of seasoned team members through advanced training and practical application. The training consists of a mix of instructional videos on key business concepts taught by subject matter experts from Mandiant, as well as threat assessment training sessions to encourage further learning and multiple choice tests. The On-Demand Cyber ​​Intelligence Training offers increased flexibility at an affordable price with 24-hour access a day.

The following courses are available immediately

  • Cyber ​​Intelligence Basics: A basic introductory course that introduces the field of Cyber ​​Intelligence; all subsequent courses deepen the concepts introduced in this course.
  • Intelligence research I (scoping): This course is based on the planning and directional phase of the intelligence life cycle. Participants learn to ask the right questions and identify the relevant context in order to correctly create an RFI, evaluate sources and use a research management system.
  • Intelligence Research II (OSINT Tools & Methods): This course is based on the collection and processing phase of the intelligence life cycle. Participants learn to use open source tools to identify and critically classify a database so that investigations can be advanced across multiple use cases.

From autumn 2021, Mandiant will offer a new course every quarter. The next planned course is Intelligence Production and is based on the production phase of the Intelligence life cycle. In this course, participants will learn how to structure, assemble, and manipulate intelligence products and briefings by deconstructing a series of manufacturer reports.

More at FirEye.com

 


About Trellix

Trellix is ​​a global company redefining the future of cybersecurity. The company's open and native Extended Detection and Response (XDR) platform helps organizations facing today's most advanced threats gain confidence that their operations are protected and resilient. Trellix security experts, along with an extensive partner ecosystem, accelerate technology innovation through machine learning and automation to support over 40.000 business and government customers.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more