Off-the-Shelf Training Curriculum
Having developed more than four hundred hours of cybersecurity training curriculum, analyze brings the expertise to prepare any organization for the most advanced cyber threats. A sample of our training curriculum is described below or you can also request a full course catalog.
Critical Infrastructure Security
Students use a simulation to learn about an organization’s dependence on critical infrastructure
Advanced Persistent Threats.
Students examine a typical APT attack based on a malicious email, document vulnerability, remote access Trojan and beaconing capability
Students examine a variety of common classes of cloud computing vulnerabilities
Students uncover hidden messages in deleted data from a hard disk image, web browser application, network trace and mobile device image
Students examine, map and modify geospecific metadata encoded in a variety of file formats using open source tools
Students examine a target mobile device to identify potential vulnerabilities and apply protections
Security and Virtual Machines
Students configure a secure web browsing environment using a VMware virtual machine
Students use a role-playing tool to examine the potential risk, loss and mitigations for five commonplace cyber attacks
Social Engineering and Social Media
Students use fictitious social media information to examine a variety of social engineering attacks against an organization
Security Privileged Accounts
Students employ a variety of password cracking, password discovery and privilege escalation techniques against a poorly-defended and well-defended system
Students test out a variety of strategies to mitigate a zero-day attack
Securing Your Home Computer
Students work through a checklist of easy-to-apply home security improvements to protect a simulated home computer
Students use a web-based application security assessment tool to discover vulnerabilities
Students work through a simulated malware incident to learn the steps of the incident handling process.