Cyber Education for Technical Specialists

Our programs are conducted by experts certified by GIAC, GREM, GCFA, CISM

Practical experience based on 1000+ successful investigations worldwide

We conduct comprehensive training sessions for our official partners Europol and Interpol

Educational Programs

Original Courses

5 daysDigital Forensics Analyst

Forensic investigation of infected hosts, including memory dumps, network traffic analysis and creation of IoC lists.

Learn more

Forensic investigation of infected hosts, including memory dumps, network traffic analysis and creation of IoC lists.

Duration: 5 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Windows Forensics;
  • Network Forensics;
  • Memory Forensics;
  • Practice. Independent case study.
Send request
7 daysDigital Forensics Analyst+

Advanced course for digital forensics analyst with more practical cases and additional topics.

Learn more

Advanced course for digital forensics analyst with more practical cases and additional topics.

Duration: 7 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Windows Forensics;
  • Network Forensics;
  • Memory Forensics;
  • Mobile Forensics;
  • Forensics Data Recovery;
  • Practical cases.
Send request
2 daysIncident Responder

Correct identification and localization of incidents, development of initial indicators of compromise, incident response. Localization of the incident using forensic analysis and malware analysis results.

Learn more

Correct identification and localization of incidents, development of initial indicators of compromise, incident response. Localization of the incident using forensic analysis and malware analysis results.

Duration: 2 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Incident Response;
  • Game «Countering a cyber attack on a company»
Send request
4 daysMalware Analyst

Analysis of malicious programs detected during incident response or forensic analysis, extraction of indicators of compromise.

Learn more

Analysis of malicious programs detected during incident response or forensic analysis, extraction of indicators of compromise.

Duration: 4 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Techniques used by malware;
  • Malware execution monitoring in controlled environments;
  • Reverse engineering of malware using IDA Pro.
Send request
5 daysThreat Hunter

Identification of new threats by searching for anomalies in the network infrastructure. Use of forensic investigation and malware analysis skills to test complex hypothesis and to get new indicators of compromise for hidden threats.

Learn more

Identification of new threats by searching for anomalies in the network infrastructure. Use of forensic investigation and malware analysis skills to test complex hypothesis and to get new indicators of compromise for hidden threats.

Duration: 5 days

Delivery method: on-site

Key topics:

  • Cyber crime trends;
  • Windows Forensics;
  • Network Forensics;
  • Memory Forensics;
  • Malware Analysis;
  • Threat Hunting.
Send request
3 daysSOC Analyst

Monitoring of information security solutions. Skills in promptly assessing situations and determining whether a threat exists and if further escalation is required. Exchange of information with other specialists involved.

Learn more

Monitoring of information security solutions. Skills in promptly assessing situations and determining whether a threat exists and if further escalation is required. Exchange of information with other specialists involved.

Duration: 3 days

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Incident Response;
  • Threat Hunting;
  • Network Forensics.
Send request
1 dayThreat Intelligence Analyst

Collection of information on current threats from public sources, Threat Intelligence feeds and incidents that have occurred within the organization. Development of a threat model applicable to the organization. Cooperation with the incident response team to help identify threats and exchange indicators of compromise.

Learn more

Collection of information on current threats from public sources, Threat Intelligence feeds and incidents that have occurred within the organization. Development of a threat model applicable to the organization. Cooperation with the incident response team to help identify threats and exchange indicators of compromise.

Duration: 1 day

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Threat Intelligence best practices.
Send request
15 daysComprehensive Cyber Security Course

All topics in one course for gaining a wide range of cyber security competencies.

Learn more

All topics in one course for gaining a wide range of cyber security competencies.

Duration: 15 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Windows Forensics;
  • Network Forensics;
  • Memory Forensics;
  • Mobile Forensics;
  • Forensics Data Recovery;
  • Incident Response;
  • Game «Countering a cyber attack on a company»;
  • Malware Analysis;
  • Threat Hunting;
  • Threat Intelligence;
Send request

Client Feedback

I would like to express my personal gratitude for the best practices and expert opinion that Group‑IB shared with us. The workshop was informative and fascinating. I am sure that our partnership with Group-IB will play an important role in the full-scale preparation to responding to all types of information security incidents.
Francisco Luis,European Cyber Security Centre (EC3), Europol

Client Feedback

We would like to express our gratitude to the malware analysis instructor, who was highly supportive and resourceful throughout the course. Amongst the content provided, we were most impressed with the case study, which contained finely crafted examples that have shed light on core problems.
Nguyen Huy DungDirector of Vietnam National Cyber Security Center
Contact us to learn more about Group-IB’s educational programs.Request a consultation

Узнайте больше о корпоративных образовательных программах Group-IB

Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Digital Forensics Analyst

Forensic investigation of infected hosts, including memory dumps, network traffic analysis and creation of IoC lists.

Duration: 5 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Windows Forensics;
  • Network Forensics;
  • Memory Forensics;
  • Practice. Independent case study.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Digital Forensics Analyst+

Advanced course for digital forensics analyst with more practical cases and additional topics.

Duration: 7 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Windows Forensics;
  • Network Forensics;
  • Memory Forensics;
  • Mobile Forensics;
  • Forensics Data Recovery;
  • Practice. Independent case study.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Incident Responder

Correct identification and localization of incidents, development of initial indicators of compromise, incident response. Localization of the incident using forensic analysis and malware analysis results.

Duration: 2 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Incident Response;
  • Game “Countering a cyber attack on a company”
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Malware Analyst

Analysis of malicious programs detected during incident response or forensic analysis, extraction of indicators of compromise.

Duration: 4 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Techniques used by malware;
  • Malware execution monitoring in controlled environments;
  • Reverse engineering of malware using IDA Pro.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Threat Hunter

Identification of new threats by searching for anomalies in the network infrastructure. Use of forensic investigation and malware analysis skills to test complex hypothesis and to get new indicators of compromise for hidden threats.

Duration: 5 days

Delivery method: on-site

Key topics:

  • Cyber crime trends;
  • Windows Forensics;
  • Network Forensics;
  • Memory Forensics;
  • Malware Analysis;
  • Threat Hunting.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

SOC Analyst

Monitoring of information security solutions. Skills in promptly assessing situations and determining whether a threat exists and if further escalation is required. Exchange of information with other specialists involved.

Duration: 3 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Incident Response;
  • Threat Hunting;
  • Network Forensics.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Threat Intelligence Analyst

Development of a threat model applicable to the organization. Cooperation with the incident response team to help identify threats and exchange indicators of compromise.

Duration: 1 day

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Threat Intelligence best practices.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Industrial Incident Responder

Incident response practices at industrial facilities with specific corporate and technological networks.

Duration: 2 days

Delivery method: on-site

Key topics:

  • Cyber crime trends in industry.
  • Techniques, targets and tools used by attackers;
  • Features of response in the infrastructure of industrial facilities.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Comprehensive Cyber Security Course

All topics in one course for gaining a wide range of cyber security competencies.

Duration: 15 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Windows Forensics;
  • Network Forensics;
  • Memory Forensics;
  • Mobile Forensics;
  • Forensics Data Recovery;
  • Incident Response;
  • Game “Countering a cyber attack on a company”;
  • Malware Analysis;
  • Threat Hunting;
  • Threat Intelligence;
  • Practical cases.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Digital Hygiene

Understanding cybercrime techniques, targets, and tools. Setting up corporate and personal devices to ensure comprehensive cybersecurity. Participants of this master class will learn about key methods of preventing data leaks, credential compromise, and malware infections.

Duration: 2 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Rules for protecting personal and corporate digital devices against data leaks and malware infections;
  • Prevention of credential compromise;
  • Basic rules for protecting the company’s reputation and brand online.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Cyber Crime Trends

Overview of current cyber threats. The master class helps to adjust the strategy of information security.

Duration: 2-4 hours

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Understanding the modern criminal;
  • Evolution of hacker tools;
  • Features of cyber attacks on various targets: individuals, financial institutions, critical infrastructure, etc
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

SOC Building

Based on 10 years of Group-IB experience in building and developing SOC, at this master class we will consider the organization of internal processes, personnel related issues and technologies used.

Duration: 2 hours

Delivery method: on-site

Key topics:

  • Approaches to SOC building;
  • Practical recommendations on building internal processes and regulations;
  • Review and selection of modern technologies;
  • Examples of implementing selected technologies.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Information Security Management
in case of an Incident

Incident response management. The structure, roles, and competencies of response teams. Working with other departments involved in eliminating attack consequences. External communications with partners and the media.

Duration: 4 hours

Delivery method: on-site

Key topics:

  • Understanding how modern cyber attacks on organizations are conducted;
  • Roles, teams, processes;
  • Practitioners’ advice on incident response management;
  • External communications with partners and media — before, during, and after the incident.
Registration
Thank you for the inquiry!
We will contact you soon.

Contact us for an individual consultation on Group-IB educational programs

Intensive CourseCybersecurity: Counteraction, People, Facts

During this one-day course, you will learn about key cybersecurity trends and tools and find out how company owners should prepare for new business realities.

Duration: 1 day

Delivery method: on-site

Target Audience: business owners, top managers, department heads

Key topics:

  • What is modern cybersecurity?
  • The faces behind cyberattacks and money theft: case studies
  • How are the most high-profile investigations conducted?
  • What are cybercriminals’ real motives?
  • What should modern business owners prepare for?
  • What is the dark web?
Registration
Thank you for the inquiry!
We will contact you soon.

Report an incident

24/7 Incident Response Assistance +7 495 984-33-64

Thank you for the inquiry! We will contact you soon.
Cookies

We use cookies on the website to make your browser experience more personal, convenient and secure. You may block or manage the use of cookies, however, in some cases they’re essential to make this site work properly. Learn more about cookies in Group-IB Privacy And Cookies Policy.