Cyber Education
for Corporate Clients

Our programs are conducted by experts certified by GIAC, GREM, GCFA, CISM

Practical experience based on 1,000+ successful investigations worldwide

We conduct comprehensive training sessions for our official partners Europol and Interpol

Group-IB educational programs for companies

Group-IB experts have developed a range of unique master class formats, as well as special‑purpose courses and training sessions for various audiences, from specialized forensic experts to top managers.

Intensive courseRisks and threats in the digital environment

An intensive program, in which you will learn about current cyber threats, cyber security in general and the basics of digital hygiene.

Learn more

An intensive program, in which you will learn about current cyber threats, cyber security in general and the basics of digital hygiene.

Duration: 1,5 hours

Delivery method: on-site

Target audience: business owners, top managers of companies, family business employees, private bankers, department directors (not IS/IT)

Key topics:

  • Modern cybercrime: who are hackers and what motivates them
  • Modern cyber threats: ways of financial and information embezzlement, targeted attacks
  • Mobile phones as a security threat
  • Cybercrime as a business process
  • How much does cybersecurity cost?
Send request
WorkshopDigital check-up

You will develop a personal risk map based on your browsing activity and used services. We reveal compromising areas, as well as help set up personal devices and home networks in line with the latest security recommendations.

Learn more

You will develop a personal risk map based on your browsing activity and used services. We reveal compromising areas, as well as help set up personal devices and home networks in line with the latest security recommendations.

Duration: 2 hours

Delivery method: on-site

Target audience: company owners, top managers, family business owners

Key topics:

  • Building a personalized risk map
  • Auditing compromised accounts
  • Setting up personal devices in line with recommended security policies
  • Scanning your home network for illegitimate devices
Send request
Intensive courseBasics of Digital Hygiene

Computer Forensics Lab experts will discuss basic methods to prevent data loss and compromised credentials, and how to set up enterprise and personal security devices

Learn more

Computer Forensics Lab experts will discuss basic methods to prevent data loss and compromised credentials, and how to set up enterprise and personal security devices

Duration: 4 hours

Delivery method: on-site

Target audience: top managers, personal assistants, financial specialists

Key topics:

  • Understanding modern cybercriminals: attack vectors
  • Secure passwords: saving passwords, attack models, methods of counteraction
  • Workplace safety: email, browser, social networks, instant messengers
  • Safe use of mobile devices (Android and IOS): recommendations and settings
  • Using cloud services without attracting the attention of cybercriminals
Send request

Educational formats for IS/IT specialists

Master classCybercrime trends using advanced technology

An overview of the threat landscape with details of this year’s most significant threats. You will get useful data on all current threats

Learn more

An overview of the threat landscape with details of this year’s most significant threats. You will get useful data on all current threats to help adjust your information security strategy.

Duration: 1,5-2 hours

Target audience: IS/IT specialists

Key topics:

  • Wannacry and NotPetya case studies, plus a review of the development of ransomware viruses
  • How criminals plan attacks on critical infrastructure
  • Targeted attacks on banks and payment systems: models and tools
  • Different types of attacks aimed at bank customers: from Android Trojans to phishing
  • Attacks on ICO: new industry as an attractive target
Send request
Intensive courseBasics of building an information security system

During this course we introduce the basics of information security for further immersion in the various areas of IS. Also, this module

Learn more

During this course we introduce the basics of information security for further immersion in the various areas of IS. Also, this module will be useful to IT professionals as a source of basic knowledge in the preparation of large IS projects.

Duration: 3 hours

Delivery method: on-site

Target audience: IT/IS specialists and managers

Key topics:

  • Current state of information security objects
  • Activities to ensure the security of IS facilities
  • Concept of in-depth defence of information security facilities
  • Information security system (ISS); building ISS processes
  • Information Security Management System (ISMS)
  • Analysis and description of security threats; evaluation and processing of IS risks
Send request
Master classRoadmap for incident response

Within the framework of this master class, we will provide step-by-step instructions on how to correctly and timely localize IS incidents in-house to minimize financial losses.

Learn more

Within the framework of this master class, we will provide step-by-step instructions on how to correctly and timely localize IS incidents in-house to minimize financial losses.

Duration: 2 hours

Delivery method: on-site или онлайн

Target audience: IT/IS specialists and managers

Key topics:

  • Modern practices in responding to security incidents
  • Actual ways to search for compromise indicators at different levels of the IT infrastructure
  • How to coordinate the actions of employees in the event of an incident
  • Legal aspects of working with digital evidence
Send request
In-depth courseComprehensive training course on digital forensics

This program from Group-IB provides an insight into how ready you are to confront world-class hackers. We will teach you how to be smarter than cybercriminals on your own network and avoid financial and reputation losses for your company.

Learn more

This program from Group-IB provides an insight into how ready you are to confront world-class hackers. We will teach you how to be smarter than cybercriminals on your own network and avoid financial and reputation losses for your company.

Duration: 5 days

Delivery method: on-site

Target audience: managers and specialists of IS/IT departments, network administrators, security incident response specialists, CERT Center specialists, digital forensics specialists

Программа курса:

  • Day 1. Initial response to incidents
  • Day 2. Computer forensics systems running on Windows
  • Day 3. RAM forensics
  • Day 4. Network forensics
  • Day 5. Investigation of malicious code
     

Additional modules can be arranged upon request.

Send request

Master classes on security in the blockchain industry

Master classInformation security for the crypto industry

An overview of all relevant cyber threats for the crypto industry, most common hacker tools and basic defense methods.

Learn more

An overview of all relevant cyber threats for the crypto industry, most common hacker tools and basic defense methods.

Duration: 1,5-2 hours

Delivery method: on-site

Target audience: business owners, top managers of companies

Key topics:

  • Blockchain market trends
  • Analysis of the most high-profile hacks: major vulnerabilities that hackers use 5 vectors of attacks on ICOs
  • Cybersecurity of cryptocurrency exchanges and funds
  • Approaches to protection against cybercrime
Send request
SessionCryptocurrency. Challenges for the traditional financial sector

This session reveals concerns over the crypto industry current challenges for traditional financial instutions.

Learn more

This session reveals concerns over the crypto industry current challenges for traditional financial instutions.

Duration: 2 hours (without strategic session), 4 hours (with strategic session)

Delivery method: on-site

Target audience: business owners, top managers of companies

Key topics:

  • Overview of stakeholders and terminology
  • What is the blockchain and cryptocurrency market review
  • Anonymity of transactions, challenges facing AML/CFT
  • How hackers steal cryptocurrency
  • Industry views: what banks think about cryptocurrency and blockchain
Send request
WorkshopCryptocurrency. Investment opportunities and risks

In this workshop, you will learn this year’s trends of cryptocurrency market. Also, we will introduce a number of risks associated with

Learn more

In this workshop, you will learn this year’s trends of cryptocurrency market. Also, we will introduce a number of risks associated with cryptocurrency and discover the ways of mitigating them.

Duration: 2 hours

Delivery method: on-site

Target audience: business owners, top managers of companies

Key topics:

  • Cryptocurrency market review: pros and cons
  • ICO review for 2017-2018
  • The dark side of cryptocurrency: illegal activities
  • How to reduce risks when working with cryptocurrency
Send request

Exclusive course from the founder of Group-IB

Intensive course

Cybercrime: counteraction, faces, facts

Duration: 1 dayDelivery method: on-site
Ilya SachkovCEO, Founder of Group-IB
Key topics:
  • What is modern cybersecurity?
  • Who are the faces behind hacker attacks and money theft?
  • How did the most high-profile investigations take place?
  • What are the real motives behind malicious actions?
  • What do the owners of modern business need to prepare for?
  • What is the «shadow Internet»?
Send request

Testimonials

I would like to express my personal gratitude for the best practices and expert opinion that Group-IB shared with us. The workshop was very informative and fascinating. I am sure that our partnership with Group-IB will play an important role in the full-scale preparation to respond to all kinds of information security incidents
Francisco LuisEuropean Cybersecurity Centre (EC3), Europol
For any inquiresContact us for an individual consultation on Group-IB corporate educational programsContact us

Please fill in the form below to learn more about Group-IB corporate educational programs

 

Thank you for the inquiry!
We will contact you soon.

Please fill in the form below to learn more about Group-IB corporate educational programs

Intensive courseRisks and threats in the digital environment

An intensive program, in which you will learn about current cyber threats, cyber security in general and the basics of digital hygiene.

Duration: 1.5 hours

Delivery method: on-site

Target audience: business owners, top managers of companies, family business employees, private bankers, department directors (not IS/IT)

Key topics:

  • Modern cybercrime: who are hackers and what motivates them
  • Modern cyber threats: ways of financial and information embezzlement, targeted attacks
  • Mobile phones as a security threat
  • Cybercrime as a business process
  • How much does cybersecurity cost?
Registration

 
I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy
Thank you for the inquiry!
We will contact you soon.

Please fill in the form below to learn more about Group-IB corporate educational programs

WorkshopDigital check-up

You will develop a personal risk map based on your browsing activity and used services. We reveal compromising areas, as well as help set up personal devices and home networks in line with the latest security recommendations.

Duration: 1 business day

Delivery method: on-site, individual consultation

Target audience: company owners, top managers, family business owners

Key topics:

  • Building a personalized risk map
  • Auditing compromised accounts
  • Setting up personal devices in line with recommended security policies
  • Scanning your home network for illegitimate devices
Registration

 
I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy
Thank you for the inquiry!
We will contact you soon.

Please fill in the form below to learn more about Group-IB corporate educational programs

Intensive courseBasics of Digital Hygiene

Computer Forensics Lab experts will discuss basic methods to prevent data loss and compromised credentials, and how to set up enterprise and personal security devices

Duration: 4 hours

Delivery method: on-site or online

Target audience: company employees, especially those dealing with confidential data: top managers, personal assistants, financial specialists

Key topics:

  • Understanding modern cybercriminals: attack vectors
  • Secure passwords: saving passwords, attack models, methods of counteraction
  • Workplace safety: email, browser, social networks, instant messengers
  • Safe use of mobile devices (Android and IOS): recommendations and settings
  • Using cloud services without attracting the attention of cybercriminals
Registration

 
I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy
Thank you for the inquiry!
We will contact you soon.

Please fill in the form below to learn more about Group-IB corporate educational programs

Master classCybercrime trends using advanced technology

An overview of the threat landscape with details of this year’s most significant threats. You will get useful data on all current threats to help adjust your information security strategy.

Duration: 1.5 — 2 hours

Delivery method: on-site or online

Target audience: IS/IT specialists

Key topics:

  • Wannacry and NotPetya case studies, plus a review of the development of ransomware viruses
  • How criminals plan attacks on critical infrastructure
  • Targeted attacks on banks and payment systems: models and tools
  • Different types of attacks aimed at bank customers: from Android Trojans to phishing
  • Attacks on ICO: new industry as an attractive target
Registration

 
I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy
Thank you for the inquiry!
We will contact you soon.

Please fill in the form below to learn more about Group-IB corporate educational programs

Intensive courseBasics of building an information security system

During this course, we introduce the basics of information security for further immersion in the various areas of IS. Also, this module will be useful to IT professionals as a source of basic knowledge in the preparation of large IS projects.

Duration: 3 hours

Delivery method: on-site or online

Target audience: IT/IS specialists and managers

Key topics:

  • Current state of information security objects
  • Activities to ensure the security of IS facilities
  • Concept of in-depth defence of information security facilities
  • Information security system (ISS): building ISS processes
  • Information Security Management System (ISMS)
  • Analysis and description ofsecurity threats
  • Evaluation and processing of IS risks
Registration

 
I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy
Thank you for the inquiry!
We will contact you soon.

Please fill in the form below to learn more about Group-IB corporate educational programs

Master classRoadmap for incident response

Within the framework of this master class, we will provide step-by-step instructions on how to correctly and timely localize IS incidents in-house to minimize financial losses.

Duration: 2 hours

Delivery method: on-site or online

Target audience: IT/IS specialists and managers

Key topics:

  • Modern practices in responding to security incidents
  • Actual ways to search for compromise indicators at different levels of the IT infrastructure
  • How to coordinate the actions of employees if an incident occurs
  • Legal aspects of working with digital evidence
Registration

 
I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy
Thank you for the inquiry!
We will contact you soon.

Please fill in the form below to learn more about Group-IB corporate educational programs

In-depth courseComprehensive training course on digital forensics

This program from Group-IB provides an insight into how ready you are to confront world-class hackers. We will teach you how to be smarter than cybercriminals on your own network and avoid financial and reputational losses for your company.

Duration: 5 days

Delivery method: on-site

Target audience: managers and specialists of IS/IT departments, network administrators, security incident response specialists, CERT Center specialists, digital forensics specialists

Course Program:

  • Day 1. Initial response to incidents
  • Day 2. Computer forensics systems running on Windows
  • Day 3. RAM forensics
  • Day 4. Network forensics
  • Day 5. Investigation of malicious code
  • Additional modules can be arranged upon request.

Registration

 
I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy
Thank you for the inquiry!
We will contact you soon.

Please fill in the form below to learn more about Group-IB corporate educational programs

Master classInformation security for the crypto industry

An overview of all relevant cyber threats for the crypto industry, most common hacker tools and basic defense methods.

Duration: 1.5 — 2 hours

Delivery method: on-site

Target audience: business owners, top managers of companies

Key topics:

  • Blockchain market trends
  • Analysis of the most high-profile hacks: major vulnerabilities that hackers use 5 vectors of attacks on ICOs
  • Cybersecurity of cryptocurrency exchanges and funds
  • Approaches to protection against cybercrime
Registration

 
I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy
Thank you for the inquiry!
We will contact you soon.

Please fill in the form below to learn more about Group-IB corporate educational programs

SessionCryptocurrency. Challenges for the traditional financial sector

This session reveals concerns over the crypto industry current challenges for traditional financial instutions.

Duration: 2 hours (without strategic session), 4 hours (with strategic session)

Delivery method: on-site

Target audience: business owners, top managers of companies

Key topics:

  • Overview of stakeholders and terminology
  • What is the blockchain and cryptocurrency market review
  • Anonymity of transactions, challenges facing AML/CFT
  • How hackers steal cryptocurrency
  • Industry views: what banks think about cryptocurrency and blockchain
Registration

 
I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy
Thank you for the inquiry!
We will contact you soon.

Please fill in the form below to learn more about Group-IB corporate educational programs

WorkshopCryptocurrency. Investment opportunities and risks

In this workshop, you will learn this year’s trends of cryptocurrency market. Also, we will introduce a number of risks associated with cryptocurrency and discover the ways of mitigating them.

Duration: 2 hours

Delivery method: on-site

Target audience: business owners, top managers of companies

Key topics:

  • Cryptocurrency market review: pros and cons
  • ICO review for 2017-2018
  • The dark side of cryptocurrency: illegal activities
  • How to reduce risks when working with cryptocurrency
Registration

 
I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy
Thank you for the inquiry!
We will contact you soon.

Please fill in the form below to learn more about Group-IB corporate educational programs

Intensive courseCybercrime: counteraction, faces, facts

During a one-day course, you will gain knowledge about modern cybersecurity trends and tools. Besides, we will share some tips for the top managers on how to prepare your businesses for real-world cyberattacks.

Duration: 1 day

Delivery method: on-site

Target audience: business owners, top managers of companies

Key topics:

  • What is modern cybersecurity?
  • Who are the faces behind hacker attacks and money theft?
  • How did the most high-profile investigations take place?
  • What are the real motives behind malicious actions?
  • What do the owners of modern business need to prepare for?
  • What is the «shadow Internet»?
Registration

 
I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy
Thank you for the inquiry!
We will contact you soon.

Report an incident

24/7 Incident Response Assistance +7 495 984-33-64

Thank you!
We will contact you soon.