Group-IB Cyber Education

Leading-edge educational programs on cyber security

Choose the program
15
educational programs
16
certified experts conducting the courses
22
partners in educational initiatives

Benefits of Group-IB courses

Experts with more than 17 years of practical experience

Since 2003, we have been monitoring all current trends in cyber security and are ready to share our accumulated knowledge in developing the most in-demand skills in the IS industry.

A wide variety of educational formats

Our programs are readily adapted to participants with different levels of training in the field of cyber security, which allows us to convey valuable information in an intelligible language to the user.

Partnership with leading educational organizations

Group-IB cooperates with key educational institutions to increase the level of digital literacy and conduct innovative joint training programs.

Group-IB Educational Programs

Learn more about the educational formats offered by Group-IB in the field of information security.
 

 

Group-IB’s trainers

Vesta Matveeva

Head of the Investigation Department, Singapore

  • Vesta is a cybersecurity expert specializing in computer crime investigation, digital research, digital forensics, and incident response.
  • Vesta has investigated international cases involving financially motivated and state-sponsored APT groups such as Buhtrap, Cobalt, Silence, Lazarus, and more. During more than 50 incident response operations, she has investigated hacker techniques that allow cybercriminals to circumvent security measures. Vesta monitors cybercriminal gangs from the perspective of TTPs and attributes their activity.
  • She has also designed a range of training courses, computer forensics teaching methods, and cybersecurity tips. Since 2016, Vesta has organized training for banks, industrial enterprises, universities, and law enforcement agencies in various countries, including the UK, the Netherlands, Bahrain, Thailand and Singapore. In 2016-2017, she conducted forensic training for Europol.

Vitalii Trifonov

Deputy Head of Digital Forensics Lab, Singapore

  • Vitalii is a reverse engineer with more than 8 years of experience in the field of malware research. His main interests include proactive protection technologies, incident response, threat hunting, threat intelligence, and malware analysis. Since 2011, he has trained many malware analysts and incident responders and led a team of reverse engineers. The extensive knowledge of APT group TTPs he has obtained during investigations and incident response activities allows him to provide the best services to the largest banks of Russia, Europe, and Asia.

Feixiang He

Senior Threat Intelligence Researcher

  • Feixiang conducts research on threat intelligence areas including malware behaviors, threat actor TTPs, malicious campaign operations, and attribution theory. He has extensive experience in topics related to the financial sector and Asian threat actors. He regularly presents the latest threat research to security conferences, law enforcement, and financial institutions. His interests included automated intelligence gathering in the wild and information source evaluation.

Shawn Tay

Senior Analyst

  • Shawn has been working in the field of cybersecurity for more than 4 years. He currently works in Group-IB’s Threat Intelligence department to actively tracks the threat intelligence lifecycle. Shawn’s work focuses on underground forums, and the deep and dark web, where he interacts with threat actors to obtain critical information.
  • Shawn has deep interest in automated intelligence gathering and has developed tools to help him in his work. He is an Offensive Security Certified Professional (OSCP), and a GREM- and GCIH-certified specialist.

Igor Mikhailov

Digital Forensics Specialist

  • Igor has been working in digital forensics and computer incident investigation for more than 20 years and has conducted over 100 forensic investigations, many of which became sources of key digital evidence.
  • Igor is an EnCE-certified specialist, the author of Mobile Forensics Cookbook, and the creator of Cyber Forensicator, an international portal, and Computer Forensics, the biggest online resource of its kind in CIS.

Sergey Nikitin

Deputy Head of Computer Forensics Laboratory

  • Sergey has been working internationally in digital forensics and incident investigation and response for nine years, including cases that involved Carbanak, Buhtrap, Lurk, Cobalt, Fin7, APT3, MoneyTaker, DarkVishnya, Silence, BlackEnergy, and other cybercriminal groups. He was one of the first experts to respond to global attacks such as NotPetya, BadRabbit, and WannaCry.
  • Sergey has been awarded a GCFA certificate and is an ISO/IEC 27001-certified auditor. He is also an official speaker for Group-IB on information security matters, with over 100 media articles, interviews, and TV appearances.

Artyom Artyomov

Senior Digital Forensics Specialist

  • With 13 years of international experience in digital forensics, incident investigation, and complex incident response, Artyom has taken part in the arrests of Carberp, Anunak, Buhtrap, Corcow, Cobalt, Moneytaker, Cron, and other criminal groups.
  • Artyom was the lead forensic specialist in high-profile investigations into the voting process of The Voice Kids and unauthorized access to Philipp Kirkorov’s personal information. Artyom teaches original digital forensics courses at several top schools and universities, including Bauman Moscow State Technical University, Higher School of Economics, MIREA Russian Technological University, the Russian Presidential Academy of National Economy and Public Administration, and the Academy of Russian Ministry of Internal Affairs.

Oleg Skulkin

Senior Digital Forensics Specialist

  • Oleg has been working in digital forensics, incident investigation, and response to complex cyberattacks worldwide for eight years. He is a regular participant and speaker at cybersecurity conferences, a GCFA-certified specialist, and a MITRE ATT&CK contributor.
  • Oleg is the author of more than 100 articles on digital forensics, incident response, threat hunting, and threat information collection and analysis. He is also the co-author of Windows Forensics Cookbook, Practical Mobile Forensics, and Learning Android Forensics.

Anastasia Barinova

Digital Forensics Specialist

  • Anastasia conducts digital forensics research, regularly participates in conferences, and develops training courses on digital forensics, incident response, threat hunting, and threat information collection and analysis.
  • Anastasia has held more than 60 training sessions in five countries and teaches original courses on digital forensics and fighting cybercrime at the Higher School of Economics, MGIMO, Moscow Institute of Physics and Technology, and Bauman Moscow State Technical University.

Svetlana Ostrovskaya

Digital Forensics Specialist

  • Svetlana conducts research studies on Android malware analysis, security assessment of web/mobile applications and smart homes, and other topics.
  • She has been published in an IEEE journal, has taken part in preparing and making a video course on the basics of information security for schoolchildren and now Svetlana teaches digital forensics at Innopolis University.

Anatoly Tykushin

Digital Forensics Specialist

  • Anatoly conducted a research study on digital forensics, the results of which have been presented at conferences and used in real incident response cases. He teaches digital forensics at Innopolis University and Skolkovo.
  • Anatoly regularly participates in complex incident response operations, conducts digital forensic investigations, develops methodologies, and assesses organizations’ incident response readiness.

Roman Rezvukhin

Malware Analyst

  • Roman has been working in malware analysis and reverse engineering for more than six years and regularly takes part in complex incident response operations worldwide.
  • Roman reverse engineers tools and malware used in complex attacks and develops utilities that automate incident response and malware analysis processes.

FAQs

Where are the courses held and how are they conducted?

Courses can be conducted on-site at Group-IB’s offices, at external venues, or at the customer’s offices, in English.

How are groups organised?

Corporate groups (training for a single company’s employees only)

General groups (training for employees from various companies)

The courses are designed for groups of 10-15 people.

Do the courses include practical exercises?

All courses for technical specialists are based on practical exercises and involve practical tasks. Some courses also include a simulation game called “Countering cyberattacks on companies”.

What skills do you need to successfully complete a course?

Our technical courses require knowledge of information security and IT.

For cooperationContact us to learn more about
Group-IB’s educational programs
Request a consultation

Contact us for an individual consultation on Group-IB corporate educational programs

Report an incident

24/7 Incident Response Assistance +65 3159-4398

Thank you for the inquiry! We will contact you soon.
Cookies

We use cookies on the website to make your browser experience more personal, convenient and secure. You may block or manage the use of cookies, however, in some cases they’re essential to make this site work properly. Learn more about cookies in Group-IB Privacy And Cookies Policy.

 
All you need to know to #StayCyberSafe