Mandiant Academy courses address essential cyber security skills that use free, open-source or existing customer technologies.
The Mandiant Academy courses in this catalog address essential cyber security skills that use free, open-source or existing customer technologies.
Instructor-led training is presented by a live instructor, either in-person or via a virtual classroom. Instructor-led training includes hands-on labs designed to accelerate learner acquisition of practical skills.
All of our instructors are security professionals with years of security experience working on the frontlines of major cyber incidents around the world.
The duration of a single instructor-led training course can range from a half-day to five days.
Web-based training (WBT) are self-paced, on-demand online courses that can be accessed at any time, from any location. Learners may pause and resume training as their schedule allows.
Our web-based training is designed to work in modern desktop browsers (Chrome, Firefox, Safari, and Microsoft Edge) and tablets (such as iPad) without the use of browser plugins. Technology needs and exceptions are noted in course descriptions when applicable.
The duration of a web-based training course can range from a half-day to four days of content.
Experiential learning uses a hands-on approach that recreates
a network compromise situation and provides a holistic incident response experience. A cyber simulation range provides
a consequence-free environment where participants are challenged to respond as a team to the latest advanced persistent threat (APT) attack methodologies.
The ability to expose teams to nation-state level attacks within a cyber range allows them to learn, practice, and innovate without experiencing an actual compromise. Experiential learning connects the training environment to the operating environment, which allows leadership to assess team performance and get an honest assessment of team readiness against relevant threats.
Incident Response Courses
Delivery Methods by Course
Onsite ILT: An onsite instructor-led course delivered at your organization’s office.
Offsite ILT: An offsite instructor-led course delivered at a third-party location.
Virtual ILT: A virtual (online) instructor-led course delivered exclusively to your organization.
Web-based training: A web-based (also on-demand or self-paced) training course accessible to your organization anytime, anywhere.
Public ILT: A public instructor-led course delivered at a Mandiant office or third-party classroom. It may include attendees from many different organizations.
Public VILT: A public virtual (online) instructor-led course which may include attendees from many different organizations.
|Course||Onsite ILT||Offsite ILT||Virtual ILT||Web-Based Training||Public ILT (per seat)||Public VILT (per seat)|
|Advanced Red Teaming Techniques: Malware Authoring and Repurposing||x||x|
|Advanced Windows Enterprise Incident Response||x||x|
|Audits and Compliance in the Cyber Domain||x||x|
|Business Email Compromise||x||x||x|
|Combined Windows-Linux Enterprise Incident Response||x||x|
|Creative Red Teaming||x||x||x||x||x|
|Cyber Intelligence Foundations||x||x||x||x||x||x|
|Cyber Intelligence Production||x|
|Cyber Security Awareness||x||x||x|
|Cyber Security Policy and Implementation||x||x|
|Digital Forensics and Incident Response for PLCs||x||x|
|Essentials of Malware Analysis||x|
|Fundamentals of Cyber Security||x||x||x|
|Fundamentals of Industrial Control Systems (ICS) Security||x||x||x||x||x|
|Incident Response for Everyone||x||x||x||x||x|
|Inside the Mind of an APT||x|
|Intelligence Research I—Scoping||x|
|Intelligence Research II—Open Source Intelligence (OSINT)||x|
|Introduction to Cyber Crime for Executives||x||x||x|
|Introduction to the Mandiant Security Instrumentation Platform||x||x||x|
|Introduction to Threat Intelligence and Attribution||x||x||x||x||x|
|Linux Enterprise Incident Response||x||x||x||x||x|
|Malicious Documents Analysis||x||x||x||x||x|
|Malware Analysis Crash Course||x||x||x||x||x|
|Malware Analysis Fundamentals||x||x||x|
|Malware Analysis Master Course||x||x|
|Network Traffic Analysis||x||x||x||x||x|
|Practical Mobile Application Security||x||x|
|Practical Threat Hunting||x||x||x||x||x|
|Senior Executive Mentorship Program||x||x|
|ThreatSpace: Real-World Attack Scenarios||x||x||x|
|Windows Enterprise Incident Response||x||x||x||x||x|