The Cybersecurity Imperative
Behind every cyberattack are bad actors with malicious intent. Whether a criminal gang trying to extort ransomware payments or a nation state attempting to infiltrate American organizations, cyber threats are human engineered. The best cyber defense begins with people well-trained to identify, protect, detect, respond and recover from cyber incidents.
Cybervance training empowers people, the frontline in cybersecurity, to protect the enterprise. Our training is outcomes focused. Performance improvement objects connect directly to operational goals. This is professional training for cybersecurity professionals. From entry level to advanced courses, we train all cybersecurity stakeholders from practitioners and leadership alike.
From security operations staff to threat hunters, Cybervance Vertex can be harnessed to strengthen individual and joint team response—improving operational outcomes. Some of the many ways to leverage Cybervance Vertex include:
Experiential Learning – Hands-on scenario training matched to an organization’s specific threat landscape and infrastructure.
Assessment and Evaluation – Measure key performance indicators (KPIs) such as response time, incident containment, and resolution accuracy to identify areas for improvement.
Training and Skill Development – Hone skills responding to various cyber threats in a safe and controlled setting.
Compliance and Security Controls – Simulated cyber attacks helps teams identify weaknesses and strengthen their security posture.
Reporting – Exercise and activity results enrich reports and inform program stakeholder planning.
Training Features
Cybervance courses are professionally developed. Our Instructional System Design team ensure materials are always current and mapped to defined learning goals and objectives. Select training features include:
Assessments - Our assessments measure application of knowledge, skills performance levels, and the readiness of participants to independently perform techniques and procedures from training. We analyze assessment results to quantify training effectiveness.
Reporting - Our reports include expert insights and recommendations supported by tools to report participant performance levels after each training and track performance from class to class to show progress.
Tailored - We customize our courses to meet the needs of each participant or agency. This means designing scenarios using relevant situations, scalable exercises, and industry-leading tools and equipment.
Lab Guides - Our guides provide step-by-step instructions with screen captures on how to perform procedures. These job aids are excellent references after the course and reinforce proper procedures.
Cybervance Training Courses
Forensics
Comprehensive curriculum enabling forensically sound digital device collection, processing, and analysis. Identification and Collection of Digital Evidence for Field Investigators (FRFI-100) Introduction to Computer Hardware (FRFI-105) Forensic Fundamentals (FREP-100) Digital Forensic Acquisition Tools (FREP-110) Digital Forensic Analysis Tools (FREP-115) Windows Forensics (FREP-200) Linux Forensics (FREP-205) Memory Analysis (FREP-300) Mentorship: Forensics (FREP-MNT) Fundamentals of Mobile Device Forensics (FRMO-100) Advanced Mobile Device Forensics (FRMO-200) Mentorship: Mobile Device Forensics (FRMO-MNT) Digital Evidence Acquisition and Rapid Response (FRDV-200) Digital Video Recovery and Analysis (FRDV-205)
Incident Response
Entry to advanced course progression covering log acquisition, static analysis, dynamic analysis, ransomware and more. Introduction to Incident Response Investigations (IRDE-100) Log Acquisition (IRDE-200) Log Analysis (IRDE-205) Incident Response and Threat Hunting for Investigators (IRDE-300) Mentorship: Incident Response (IRDE-MNT) Malware Investigations: Static Analysis (IRMA-100) Malware Investigations: Dynamic Analysis (IRMA-200) Malware Investigations: Mobile Devices (IRMA-300) Mentorship: Malware (IRMA-MNT) Ransomware Investigations (IRRW-375)
Network Investigations
Fundamental courses introduce key network technologies, advanced courses enable comprehensive network intrusion investigations. Network Fundamentals (NWIN-100) Network Forensics (NWIN-110) Network Intrusion Fundamentals (NWIN-200) Network Intrusion Investigations (NWIN-300) Mentorship: Network Investigations (NWIN-MNT)
Online Investigations
Course series navigates social media and the dark web complexities to enable effective online investigations. Online Investigations (ONIN-100) Online Investigations: Social Media (ONIN-200) Mentorship: Online Investigations (ONIN-MNT) Online Investigations: Darkweb (ONIN-300) Mentorship: Darkweb (ONDW-MNT)
Cryptocurrency
Foundational training leads to more advanced investigation courses focused on tracing an attribution, fraud and scams. Cryptocurrency Introduction (CPTC-100) Cryptocurrency: Tracing (CPTC-200) Cryptocurrency: Fraud and Scams (CPTC-300) Mentorship: Cryptocurrency (CPTC-MNT)
Cyber Defense
Progressive curriculum designed to protect the enterprise with courses for network users and cyber defenders covering Zero Trust Architecture, cloud security, and more. Cyber Defense Awareness: Network Users (CDLE-100) Cyber Defense Awareness: Leadership (CDLE-105) Cyber Defense (CDLE-200) Zero Trust Architecture Awareness (CDLE-205) Cloud Security (CDLE-210) Triage and Endpoint Forensics (CDLE-215) Mentorship: Cyber Defense (CDLE-MNT)
Management
Courses designed to support operational management from standard operating procedures to internal training programs. Cyber Unit Initial Assessment (MGCU-000) Cyber Unit Management Consultation (MGCU-200) Mentorship: Cyber Unit Management (MGCU-MNT) Standard Operating Procedures Workshop (MGSP-200) Mentorship: Standard Operating Procedures (MGSP-MNT) Cyber Academy Curriculum Development (MGCD-200) Mentorship: Cyber Academy Curriculum Development (MGCD-MNT)
Executive & Legal
Specialized cyber courses for leadership and legal professionals to raise awareness and foster fluency in today’s technologies. Cyber Judicial Workshop (ELCW-100) Cyber Prosecution Workshop (ELCW-105) Artificial Intelligence in Crime and Policing: Challenges and Opportunities (ELAI-100) Cyber-Enabled Terrorism and Emerging Threats (ELCT-100) Network Intrusion (ELNI-100)