Off-the-Shelf Training Curriculum

Having developed more than four hundred hours of cybersecurity training curriculum, analyze brings the expertise to prepare any organization for the most advanced cyber threats. A sample of our training curriculum is described below or you can also request a full course catalog.

Analyze_Pin_Green.png

Critical Infrastructure Security

Students use a simulation to learn about an organization’s dependence on critical infrastructure

Analyze_Pin_Cyan.png

Advanced Persistent Threats.

Students examine a typical APT attack based on a malicious email, document vulnerability, remote access Trojan and beaconing capability

Analyze_Pin_Magenta.png

Cloud Computing

Students examine a variety of common classes of cloud computing vulnerabilities

Analyze_Pin_Purple.png

Computer Forensics

 Students uncover hidden messages in deleted data from a hard disk image, web browser application, network trace and mobile device image

Analyze_Pin_Red.png

Geotagging

Students examine, map and modify geospecific metadata encoded in a variety of file formats using open source tools

Analyze_Pin_Yellow.png

Mobile Devices

Students examine a target mobile device to identify potential vulnerabilities and apply protections

Analyze_Pin_Cyan.png

Security and Virtual Machines

Students configure a secure web browsing environment using a VMware virtual machine

Analyze_Pin_Green.png

Contingency Planning

Students use a role-playing tool to examine the potential risk, loss and mitigations for five commonplace cyber attacks

Analyze_Pin_Purple.png

Social Engineering and Social Media

Students use fictitious social media information to examine a variety of social engineering attacks against an organization

Analyze_Pin_Magenta.png

Security Privileged Accounts

Students employ a variety of password cracking, password discovery and privilege escalation techniques against a poorly-defended and well-defended system

Analyze_Pin_Red.png

Mitigating Vulnerabilities

Students test out a variety of strategies to mitigate a zero-day attack

Analyze_Pin_Yellow.png

Securing Your Home Computer

Students work through a checklist of easy-to-apply home security improvements to protect a simulated home computer

Analyze_Pin_Cyan.png

Application Security

Students use a web-based application security assessment tool to discover vulnerabilities

Analyze_Pin_Green.png

Incident Response. 

Students work through a simulated malware incident to learn the steps of the incident handling process.