Cyber Education for Wide Audiences

Education for Wide Audiences

Benefits of Group-IB master classes:

In recent years, many organizations have made cybersecurity one of their priorities. As more than 90% of incidents occur due to human error, we have prepared interactive master classes for employees and top managers on how to minimise incident risks in today’s business environment.
Valeriy BaulinHead of Digital Forensics Lab
Relevance for all organizations
  • From the organizations with the most advanced infrastructures to those that are only beginning to build their security infrastructure.
Experts with extensive practical experience
  • Master classes on the most relevant and practical cybersecurity topics.

Master Classes for Wide Audiences

2-4 hoursDigital Hygiene

Understanding cybercrime techniques, targets, and tools. Setting up corporate and personal devices to ensure comprehensive cybersecurity. Participants of this master class will learn about key methods of preventing data leaks, credential compromise, and malware infections.

Learn more

Understanding cybercrime techniques, targets, and tools. Setting up corporate and personal devices to ensure comprehensive cybersecurity. Participants of this master class will learn about key methods of preventing data leaks, credential compromise, and malware infections..

Duration: 2-4 hours

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Rules for protecting personal and corporate digital devices against data leaks and malware infections;
  • Prevention of credential compromise;
  • Basic rules for protecting the company’s reputation and brand online.
Send request
2-4 hoursCyber Crime Trends

Overview of current cyber threats. The master class helps to adjust the strategy of information security.

Learn more

Overview of current cyber threats. The master class helps to adjust the strategy of information security.

Duration: 2-4 hours

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Understanding the modern criminal;
  • Evolution of hacker tools;
  • Features of cyber attacks on various targets: individuals, financial institutions, critical infrastructure, etc.
Send request
2 hoursSOC Building

Based on 10 years of Group-IB experience in building and developing SOC, at this master class we will consider the organization of internal processes, personnel related issues and technologies used.

Learn more

Based on 10 years of Group-IB experience in building and developing SOC, at this master class we will consider the organization of internal processes, personnel related issues and technologies used.

Duration: 2 hours

Delivery method: on-site

Key topics:

  • Approaches to SOC building;
  • Practical recommendations on building internal processes and regulations;
  • Review and selection of modern technologies;
  • Examples of implementing selected technologies.
Send request
4 hoursInformation Security Management in Case of an Incident

Incident response management. The structure, roles, and competencies of response teams. Working with other departments involved in eliminating attack consequences. External communications with partners and the media.

Learn more

Incident response management. The structure, roles, and competencies of response teams. Working with other departments involved in eliminating attack consequences. External communications with partners and the media.

Duration: 4 hours

Delivery method: on-site

Key topics:

  • Understanding how modern cyber attacks on organizations are conducted;
  • Roles, teams, processes;
  • Practitioners’ advice on incident response management;
  • External communications with partners and media — before, during, and after the incident.
Send request

Original Course from the Founder of Group-IB

Intensive Course

Cybersecurity: Counteraction, People, Facts

Duration: 1 working dayDelivery method: on-site
Ilya SachkovGeneral Manager and founder of Group-IB
Key topics:
  • What is modern cybersecurity?
  • The faces behind cyberattacks and money theft: case studies
  • How are the most high-profile investigations conducted?
  • What are cybercriminals’ real motives?
  • What should modern business owners prepare for?
  • What is the dark web?
Send request
Contact us to learn more about
Group-IB’s corporate master classes
Request a consultation

Contact us for an individual consultation on Group-IB educational programs

Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Digital Forensics Analyst

Forensic investigation of infected hosts, including memory dumps, network traffic analysis and creation of IoC lists.

Duration: 5 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Windows Forensics;
  • Network Forensics;
  • Memory Forensics;
  • Practice. Independent case study.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Digital Forensics Analyst+

Advanced course for digital forensics analyst with more practical cases and additional topics.

Duration: 7 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Windows Forensics;
  • Network Forensics;
  • Memory Forensics;
  • Mobile Forensics;
  • Forensics Data Recovery;
  • Practice. Independent case study.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Incident Responder

Correct identification and localization of incidents, development of initial indicators of compromise, incident response. Localization of the incident using forensic analysis and malware analysis results.

Duration: 2 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Incident Response;
  • Game “Countering a cyber attack on a company”
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Malware Analyst

Analysis of malicious programs detected during incident response or forensic analysis, extraction of indicators of compromise.

Duration: 4 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Techniques used by malware;
  • Malware execution monitoring in controlled environments;
  • Reverse engineering of malware using IDA Pro.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Threat Hunter

Identification of new threats by searching for anomalies in the network infrastructure. Use of forensic investigation and malware analysis skills to test complex hypothesis and to get new indicators of compromise for hidden threats.

Duration: 5 days

Delivery method: on-site

Key topics:

  • Cyber crime trends;
  • Windows Forensics;
  • Network Forensics;
  • Memory Forensics;
  • Malware Analysis;
  • Threat Hunting.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

SOC Analyst

Monitoring of information security solutions. Skills in promptly assessing situations and determining whether a threat exists and if further escalation is required. Exchange of information with other specialists involved.

Duration: 3 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Incident Response;
  • Threat Hunting;
  • Network Forensics.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Threat Intelligence Analyst

Development of a threat model applicable to the organization. Cooperation with the incident response team to help identify threats and exchange indicators of compromise.

Duration: 1 day

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Threat Intelligence best practices.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Industrial Incident Responder

Incident response practices at industrial facilities with specific corporate and technological networks.

Duration: 2 days

Delivery method: on-site

Key topics:

  • Cyber crime trends in industry.
  • Techniques, targets and tools used by attackers;
  • Features of response in the infrastructure of industrial facilities.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Comprehensive Cyber Security Course

All topics in one course for gaining a wide range of cyber security competencies.

Duration: 15 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Windows Forensics;
  • Network Forensics;
  • Memory Forensics;
  • Mobile Forensics;
  • Forensics Data Recovery;
  • Incident Response;
  • Game “Countering a cyber attack on a company”;
  • Malware Analysis;
  • Threat Hunting;
  • Threat Intelligence;
  • Practical cases.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Digital Hygiene

Understanding cybercrime techniques, targets, and tools. Setting up corporate and personal devices to ensure comprehensive cybersecurity. Participants of this master class will learn about key methods of preventing data leaks, credential compromise, and malware infections.

Duration: 2 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Rules for protecting personal and corporate digital devices against data leaks and malware infections;
  • Prevention of credential compromise;
  • Basic rules for protecting the company’s reputation and brand online.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Cyber Crime Trends

Overview of current cyber threats. The master class helps to adjust the strategy of information security.

Duration: 2-4 hours

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Understanding the modern criminal;
  • Evolution of hacker tools;
  • Features of cyber attacks on various targets: individuals, financial institutions, critical infrastructure, etc
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

SOC Building

Based on 10 years of Group-IB experience in building and developing SOC, at this master class we will consider the organization of internal processes, personnel related issues and technologies used.

Duration: 2 hours

Delivery method: on-site

Key topics:

  • Approaches to SOC building;
  • Practical recommendations on building internal processes and regulations;
  • Review and selection of modern technologies;
  • Examples of implementing selected technologies.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Information Security Management
in case of an Incident

Incident response management. The structure, roles, and competencies of response teams. Working with other departments involved in eliminating attack consequences. External communications with partners and the media.

Duration: 4 hours

Delivery method: on-site

Key topics:

  • Understanding how modern cyber attacks on organizations are conducted;
  • Roles, teams, processes;
  • Practitioners’ advice on incident response management;
  • External communications with partners and media — before, during, and after the incident.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Intensive CourseCybersecurity: Counteraction, People, Facts

During this one-day course, you will learn about key cybersecurity trends and tools and find out how company owners should prepare for new business realities.

Duration: 1 day

Delivery method: on-site

Target Audience: business owners, top managers, department heads

Key topics:

  • What is modern cybersecurity?
  • The faces behind cyberattacks and money theft: case studies
  • How are the most high-profile investigations conducted?
  • What are cybercriminals’ real motives?
  • What should modern business owners prepare for?
  • What is the dark web?
Registration
Thank you for the inquiry!
We will contact you soon.

Report an incident

24/7 Incident Response Assistance +65 3159-3798

Thank you for the inquiry! We will contact you soon.
Cookies

We use cookies on the website to make your browser experience more personal, convenient and secure. You may block or manage the use of cookies, however, in some cases they’re essential to make this site work properly. Learn more about cookies in Group-IB Privacy And Cookies Policy.