New from Mandiant Academy: Protect your perimeter with practical network training
Brett Reschke
Sr. Intelligence Training Developer, Google
For too long, network data analysis has felt less like a science and more like deciphering cryptic clues. To help close that gap, we’re introducing a new Mandiant Academy course from Google Cloud, designed to replace frustration with clarity and confidence.
Protecting the Perimeter: Practical Network Enrichment focuses on the key skills necessary to transform network traffic analysis from a daunting task into a powerful, precise security asset.
We’ve designed the course specifically for cybersecurity professionals who need to quickly and effectively enhance network traffic analysis skills. You’ll learn to cut through the noise, identify malicious fingerprints with higher accuracy, and fortify your organization's defenses by integrating critical cyber threat intelligence (CTI).
What you’ll learn
This track includes four courses that provide practical methods to analyze networks and operationalize CTI. Students will explore five proven methodologies to network analysis:
-
Packet capture (PCAP)
-
Network flow (netflow)
-
Protocol analysis
-
Baseline and behavioral
-
Historical analysis
Incorporating common tools, we demonstrate how to enrich each methodology adding CTI, and how analytical tradecraft enhances investigations.
The first course, Decoding Network Defense, refreshes foundational CTI principles and the five core network traffic analysis methodologies.
The second course, Analyzing the Digital Battlefield, investigates PCAP, netflow, and protocol before exploring how CTI enriches new evidence.
In the third course, Insights into Adversaries, students learn to translate complex human behaviors into detectable signatures.
The final course, The Defender's Arsenal, introduces essential tools for those on the frontline, protecting their network’s perimeter.
Who should attend this course?
“Protecting the Perimeter” was developed for practitioners whose daily work is to interpret network telemetry from multiple data sources and identify anomalous behavior.This track’s format is designed for professionals who possess enough knowledge and skill to defend networks, but have limited time to continue education and enhance their abilities.
This training track is the second release from Mandiant Academy’s new approach to on-demand training which concentrates complex security concepts into short-form courses.
Sign up today
To learn more about and register for the course, please visit the Mandiant Academy website. You can also access Mandiant Academy's on-demand, instructor-led, and experiential training options. We hope this course proves helpful in your efforts to defend your organization against cyber threats.