Skip to main content
Mandiant on Google Cloud
  • Consulting
  • Intelligence
  • Managed Services
  • Solutions
  • Products
  • Resources

Mandiant Consulting

Respond to breaches, mitigate threats, reduce risk, and get back to business with the help of leading experts. Our experience comes directly from the frontlines, and is backed by leading threat researchers and incident responders so we can provide you
with the best guidance to increase the power of your security program.

Learn more
  • Featured Categories
  • Incident Response
    Tackle breaches confidently
  • AI Security
    Secure the use of AI
  • Strategic Readiness
    Increase resilience to risk
  • Cybersecurity Transformation
    Establish and activate cyber defenses
  • Technical Assurance
    Test your security program
  • Mandiant Academy
    Train your teams to protect effectively
  • Incident Response Retainer and Expertise on Demand
    Flexible access to Mandiant experts
  • View all Consulting Services

Threat Intelligence

Get comprehensive visibility and context on the threats that matter most to your organization.

Learn more

  • Products
  • Threat Intelligence
    Actionable threat intelligence at Google scale
  • Services
  • Applied Intelligence
    Have direct access to threat intelligence experts
  • Cyber Threat Profile
    Get a composite picture of the threats that matter most to you
  • Intelligence Program Development
    Build a comprehensive threat intelligence program
  • Use Case
  • Ransomware
    Increase resilience against multifaceted extortion
  • Cyber Risk Management
    Advance your business approach to cyber security
  • Digital Risk Protection
    Prioritize and focus on threats that matter
  • Industrial Controls
    Strengthen OT and ICS security
  • Insider Threats
    Uncover and manage internal vulnerabilities
  • Skills Gap
    Close gaps with training and access to expertise
  • Private Industry
  • Finance New!
    Extend your security posture and operationalize resilience
  • Manufacturing New!
    Protect against cyber security threats to maintain business continuity
  • Government
  • Election Security
    Focus on Election Infrastructure Protection
  • Government New!
    Protect national services and agencies

Security Solutions

Solve your toughest cybersecurity challenges with combinations of products and services.

  • Featured categories
  • Continuous Threat Exposure Management
    Reduce exposures before adversaries act
  • Digital Risk Protection
    Prioritize and focus on the threats that matter
  • Cyber Risk Management
    Advance your business approach to cybersecurity
  • Industrial Controls
    Strengthen OT and ICS security
  • Ransomware
    Increase resilience against multifaceted extortion
  • Insider Threats
    Uncover and manage internal vulnerabilities
  • Election Security
    Focus on Election Infrastructure Protection
  • Government
    Protect national services and agencies

Mandiant Managed Services

Mandiant Managed Services provides continuous monitoring, expert threat hunting, and rapid incident response, empowering your security team to stay ahead of evolving cyber risks. We supplement your security team with world-class expertise to fortify your defenses against advanced threats.

  • Featured categories
  • Managed Detection and Response (MDR)
    24x7 detection and response support
  • Managed Threat Hunting
    Continual threat hunting
  • Managed Defense
    Find and eliminate threats with confidence 24x7
  • Mandiant Hunt
    Uncover hidden attacks with elite Mandiant threat hunters by your side

Security Products

Be more proactive in protecting your organization from attacks by understanding your threat landscape, vulnerabilities, and potential blind spots and how actors will target them.

  • Featured Categories
  • Threat Intelligence
    Access the latest intelligence from the frontlines
  • Attack Surface Management
    Map your external environment
  • Digital Threat Monitoring
    Visibility into the deep, dark and open web
  • Security Validation
    Validate controls are working properly
  • Blogs
  • Threat Intelligence
    In-depth security research and guidance
  • Transform
    Security topics for boards and executives
  • Google Security and Identity
    Company news and other security stories
  • Support
  • Customer Success
    Cloud Security Customer Success
  • Technical Support
    Google Cloud Customer Care
  • Sign in to Advantage
  • English
  • Français
  • Deutsch
  • Italiano
  • 日本
  • 한국어
  • Español

Get Started

  • Consulting
    • Incident Response
    • Strategic Readiness
    • Technical Assurance
    • Incident Response Retainer and Expertise on Demand
    • AI Security
    • Cybersecurity Transformation
    • Mandiant Academy
    • View all consulting services
  • Intelligence
    • Product
    • Threat Intelligence
    • Services
    • Applied Intelligence
    • Cyber Threat Profile
    • Intelligence Program Development
  • Managed Services
    • Managed Detection and Response (MDR)
    • Managed Threat Hunting
    • Managed Defense
    • Managed Hunt
  • Solutions
    • Continuous Threat Exposure Management
    • Digital Risk Protection
    • Cyber Risk Management
    • Industrial Controls
    • Ransomware
    • Insider Threats
    • Election Security
    • Government
  • Products
    • Threat Intelligence
    • Attack Surface Management
    • Digital Threat Monitoring
    • Security Validation
  • Resources
    • Blogs
    • Threat Intelligence
    • Google Security and Identity
    • Transform
    • Support
    • Technical Support
    • Customer Success
  • Mobile Footer Section
    • See what’s new at Mandiant
    • Get started
    • Incident Response Help
    • Contact Sales
    • Blog

Top

  • Incident Response
  • Contact sales
  • Support

Mandiant is now part of Google Cloud and continues to provide product-agnostic cybersecurity consulting and intelligence services to organizations. Learn More >

  • Contact us
  • report_problemIncident Response Assistance

Breadcrumb

  1. Home
  2. Mandiant Academy's Cybersecurity Training
  3. Certifications
File
Cyber Threat Intelligence Analysis_Exam Guide_2024 (1).pdf (287.34 KB)
  • Follow us




Footer

  • Consulting
    • Incident Response
    • Strategic Readiness
    • Technical Assurance
    • Incident Response Retainer and Expertise on Demand
    • AI Security
    • Cybersecurity Transformation
    • Mandiant Academy
    • View all consulting services
  • Intelligence
    • Threat Intelligence
    • Applied Intelligence
    • Cyber Threat Profile
    • Intelligence Program Development
  • Managed Services
    • Managed Detection and Response (MDR)
    • Managed Threat Hunting
    • Managed Defense
    • Managed Hunt
  • Solutions
    • Continuous Threat Exposure Management
    • Digital Risk Protection
    • Cyber Risk Management
    • Industrial Controls
    • Ransomware
    • Insider Threats
    • Election Security
    • Government
  • Products
    • Threat Intelligence
    • Attack Surface Management
    • Digital Threat Monitoring
    • Security Validation
  • Blogs
    • Threat Intelligence Blog
    • Google Security and Identity Blog
    • Transform Blog
  • Support
    • Customer Success
    • Technical Support
  • Connect with Mandiant
    • Contact Us
    • Report an Incident
    • Media Inquiries

© Copyright 2024 Mandiant. All rights reserved.

Bottom

  • Privacy & Cookies Policy
  • Terms & Conditions
  • Site Map