Cyber Education for Universities

Cyber Education for Universities

Group-IB educational programs benefits

While still at university, we founded our own company Group-IB, which subsequently became our lifetime project. After receiving fundamental theoretical training at Bauman Moscow State Technical University, we developed large-scale expertise in the investigation and prevention of high-tech crimes. Now it is important for us to share our experience with universities and help to train qualified specialists in the field of information security.
Dmitry Volkov, CTO, co-founder of Group‑IB

Why do leading universities cooperate with Group-IB

Certified experts
  • Our programs are led by experts with extensive experience attested by international certificates and state-recognized certificates in the field of information security
Advanced technology
  • Group-IB uses its own technological tools, thanks to which we occupy leading positions on the information security market
Relevance of cybersecurity knowledge
  • We know what skills and competencies are required for students to build a career in the current field of information security and we develop them during our courses
Group-IB R&D Centre
  • We are building a network of analytical centres with key technical universities and industrial partners for joint research and piloting of high-tech projects
UN contest: Impact of Business
  • Group-IB supports the United Nations Global Compact Association’s contest for Sustainable Development Goals (SDGs), which stimulates youth debate on the role of business in achieving SDGs

Group-IB educational formats for universities

Master class Risks and threats in the digital environment

An intensive program based on real company cases, during which you will learn about the current trends in cybercrime and the rules of personal cybersecurity.

Learn more

An intensive program based on real company cases, during which you will learn about the current trends in cybercrime and the rules of personal cybersecurity.

Duration: 2 hours

Delivery method: on-site

Key topics:

  • Modern cybercrime: who are hackers and what motivates them
  • Modern cyber threats: ways of financial and information embezzlement
  • Mobile phones as a security threat
  • What is the «shadow Internet» and why is it dangerous
  • Confrontation and defence: rules of personal cybersecurity
Send request
WorkshopThe rules of personal cybersecurity

The aim of the workshop is to secure the digital infrastructure of each participant. During the lesson, participants actively use

Learn more

The aim of the workshop is to secure the digital infrastructure of each participant. During the lesson, participants actively use personal devices (phone/computer). Together we detect key risks and show how to work with each of them.

Duration: 2 hours

Delivery method: on-site

Key topics:

  • What is phishing and phishing emails, and why can’t they be opened?
  • Most common viruses on the Internet and how to protect yourself from them
  • Cyberbullying and trolling: how should you behave?
  • Rules of digital hygiene: make your digital space reliable
Send request
Intensive courseDigital forensics

A practical course that equips students with the tools to proactively search for and detect threats. You gain skills in tracing the chronology of an attack and explore various types of incidents.

Learn more

A practical course that equips students with the tools to proactively search for and detect threats. You gain skills in tracing the chronology of an attack and explore various types of incidents.

Duration: 4 hours

Delivery method: on-site

Key topics:

  • Basics of computer forensics
  • Hard disk structure, NTFS file system structure
  • Detection of data-hiding tactics and their unmasking
  • Practical exercises with compromised systems
  • Examination of various cyber threats
Send request
WorkshopBlockchain — Technology of the Future

The purpose of this master class is to provide an initial overview of blockchain technology and to show the main threats associated with

Learn more

The purpose of this master class is to provide an initial overview of blockchain technology and to show the main threats associated with its use.

Duration: 2 hours

Delivery method: on-site

Key topics:

  • How does the blockchain work and where is it used?
  • What are cryptocurrencies? How big is the cryptocurrency market?
  • Key players of the blockchain and cryptocurrency industry
  • Pros and cons of blockchain technology
  • Key vectors of attacks by cybercriminals
Send request
Master classBrand protection in the digital space

One of the most important assets of a company is its brand. Companies with a well-known and successfully represented

Learn more

One of the most important assets of a company is its brand. Companies with a well-known and successfully represented brand are exposed to serious risks. In this master class, we explain and develop approaches for combating them.

Duration: 2,5 hours

Delivery method: on-site

Key topics:

  • Modern online fraud schemes for exploiting brands
  • Strategy and tactics of online reputation management
  • Sources of cyber threats to your brand
  • Methods of protection against cybercriminal activity
Send request

 
 

We are ready to create an individualized course on any of the Group-IB’s specializations and integrate it into your university program

Anastasia BarinovaDigital Forensics trainerbarinova@group-ib.com

Testimonials

Every year, more and more people sign up for the Higher School of Economics (HSE) Master’s degree in Information Security Management. And we are glad to cooperate with Group-IB on our educational programs: the company’s considerable experience in the sphere of information security helps our Bachelor’s and Master’s students to obtain the necessary practical and applied knowledge in this field.
Margarita ZobninaDirector of Marketing for Educational Programs, HSE

Testimonials

It was gratifying to meet Group-IB’s Ruslan Yusufov at our university. The expert told participants in the roundtable about hackers and what methods they use, cybercrime and ways of preventing it. Also, future specialists were given several tips on how to protect their personal data from cyber threats. We are looking forward to new meetings and cooperation with your company!
Mikhail DolgachevHead of the Department of Export Control and Information Protection, Pacific State University, Associate Professor

Testimonials

It is vital to train future specialists not only in fundamental and theoretical areas, but also to dovetail practice as closely as possible with real-life conditions. Group-IB specialists impart the necessary practical skills thanks to their vast experience in cybercrime investigation and prevention.
Iskander ZulkarneevSenior Lecturer, Department of Information Security Institute of Mathematics and Computer Sciences, Tyumen State University
For any inquiresWe are open to your proposals on cooperation in the field of educational initiatives for universitiesContact us

Please fill in the form below to learn more about Group-IB educational programs for universities

 

I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies
Спасибо, мы свяжемся с Вами в самое ближайшее время.

Please fill in the form below to learn more about Group-IB educational programs for universities

Master classRisks and threats in the digital environment

An intensive program based on real company cases, during which you will learn about the current trends in cybercrime and the rules of personal cybersecurity.

Duration: 2 hours

Delivery method: on-site

Key topics:

  • Modern cybercrime: who are hackers and what motivates them
  • Modern cyber threats: ways of financial and information embezzlement
  • Mobile phones as a security threat
  • What is the «shadow Internet» and why is it dangerous
  • Confrontation and defence: rules of personal cybersecurity
Registration

 
I understand and agree that my personal data will be collected and processed according to the
Privacy and Cookies
Спасибо, мы свяжемся с Вами в самое ближайшее время.

Please fill in the form below to learn more about Group-IB educational programs for universities

WorkshopThe rules of personal cybersecurity

The aim of the workshop is to secure the digital infrastructure of each participant. During the lesson, participants actively use personal devices (phone/computer). Together we detect key risks and show how to work with each of them.

Duration: 2 hours

Delivery method: on-site

Key topics:

  • What is phishing and phishing emails, and why can’t they be opened?
  • Most common viruses on the Internet and how to protect yourself from them
  • Cyberbullying and trolling: how should you behave?
  • Rules of digital hygiene: make your digital space reliable
Registration

 
I understand and agree that my personal data will be collected and processed according to the
Privacy and Cookies
Спасибо, мы свяжемся с Вами в самое ближайшее время.

Please fill in the form below to learn more about Group-IB educational programs for universities

Intensive courseDigital forensics

A practical course that equips students with the tools to proactively search for and detect threats. You gain skills in tracing the chronology of an attack and explore various types of incidents.

Duration: 4 hours

Delivery method: on-site

Key topics:

  • Basics of computer forensics
  • Hard disk structure, NTFS file system structure
  • Detection of data-hiding tactics and their unmasking
  • Practical exercises with compromised systems
  • Examination of various cyber threats
Registration

 
I understand and agree that my personal data will be collected and processed according to the
Privacy and Cookies
Спасибо, мы свяжемся с Вами в самое ближайшее время.

Please fill in the form below to learn more about Group-IB educational programs for universities

WorkshopBlockchain — Technology of the Future

The purpose of this master class is to provide an initial overview of blockchain technology and to show the main threats associated with its use.

Duration: 2 hours

Delivery method: on-site

Key topics:

  • How does the blockchain work and where is it used?
  • What are cryptocurrencies? How big is the cryptocurrency market?
  • Key players of the blockchain and cryptocurrency industry
  • Pros and cons of blockchain technology
  • Key vectors of attacks by cybercriminals
Registration

 
I understand and agree that my personal data will be collected and processed according to the
Privacy and Cookies
Спасибо, мы свяжемся с Вами в самое ближайшее время.

Please fill in the form below to learn more about Group-IB educational programs for universities

Master classBrand protection in the digital space

One of the most important assets of a company is its brand. Companies with a well-known and successfully represented brand are exposed to serious risks. In this master class, we explain and develop approaches for combating them.

Duration: 2.5 hours

Delivery method: on-site

Key topics:

  • Modern online fraud schemes for exploiting brands
  • Strategy and tactics of online reputation management
  • Sources of cyber threats to your brand
  • Methods of protection against cybercriminal activity
Registration

 
I understand and agree that my personal data will be collected and processed according to the
Privacy and Cookies
Спасибо, мы свяжемся с Вами в самое ближайшее время.

Report an incident

24/7 Incident Response Assistance +7 495 984-33-64

Thank you!
We will contact you soon.