“Attacks change, security tools change, attack technology changes, attackers’ methods and groups change. You have to adapt to the changing landscape of attacks and attackers or you will be lost in the cyberspace landscape”
~ M. Goedeker 2018
To build the next generation of Courseware and Certifications that focuses on actual cyber risk intelligence research and collection methods and uses practical exercises to help deepen knowledge and build experience in using our methodology, framework and platform to find new risks and threats faster.
Why take Training modules?
Our Training is focused around a completely different educational paradigm. We want to speed up the training phase so that people can build actual experience. This only happens when you cover all the basics and advanced topics so that these unique students hit the ground running into mid-level cyber roles without wasting precious time.
In order to speed up any training process you need to give people the opportunity to grow in a protected and nurturing environment full of excellent subject matter researchers, then let them come to their own understanding of the topics you teach.
Lastly, we push all students to also talk about and teach micro sessions so that they build any missing soft skills they will need in their next jobs or endeavours. We want all of our students to not only pass exams and get certified but excel.
We build future partners, security leaders, researchers, architects and auditors that are able to provide tangible value to critical infrastructure, research and businesses of all sizes.
ITIL Foundation – The Basis for Everything Security
Offers details on ITIL Foundation differences from v2 to v3, then takes a security approach to introducing the ITIL Suite of services, functions and how they relate to each other.
This course is the first module for all Certified Paths. ITIL Foundation serves as the ground work for any SOC or Security Consultant, Auditor or Manager, CISO as these basic processes, functions and areas are the basis for all security policies and also include primers on Forensics.
Introduction to Cyber Security– Foundational and General info on Cyber Security
Expanding on ITIL Foundation we then establish the basic foundation and vocabulary to Cyber Security including components of the Cyber Areas, eEconomy and other areas important to understand in order to use more advanced topics such as OSINT and Darknet Analysis.
In this introductory course we explore the basics of Cyber Strategy, Cyber Units, Cyber Defence and Offense as well as understand other historic and modern security relevant areas that enable students to continue on into various cyber security jobs as well as prepare themselves for Cyber Analyst Certifications and more advanced topics such as Darknet Analysis and OSINT.
Log Management, SIEM, SOC Operations – Tools, Maturity
This last module to Foundation Level builds upon the last two courses to review and build on basics taught in ITIL Foundation and Intro to Cyber Security, talking about various aspects of Log Management, Sizing, Implementation and SOC operations.
This course includes short mini courses for understanding the basics of QRadar/Extreme Networks SIEM as well as McAfee Nitro SIEM, talking about differences in the two and comparisons to AlienVault as well as HP ArcSight SIEM configuration, Rules, Alerts, Reports and troubleshooting so that the student not only sees this but understands how correlation of data and information leads to actionable intelligence.
OSINT For the Cyber Analyst – OSINT Skills for Cyber Analysts using Risk Intel
This course goes deeper into techniques and basics of Open Source Intelligence, talking about the intelligence life-cycle and various (technical) and IT related components used in gaining intelligence about targets or attackers using various different types of tools and then speeding all that up by automating many of those tasks using CyberNSight.
All Advanced and Certified Courses have Practical Exams or Tasks that need to be completed either online or in the classrooms with groups or as a single analyst. This course utilizes our own Cyber Risk Intelligence framework which focuses more on the aspects of Cyber rather than classical intelligence.
We also work on practical examples in order to be able to use the skills in this training for real life scenarios so that the student gets real life experience using our Cyber Risk Intelligence platform CyberNSight.
Cyber Purple Unit Team Leader – Blended Cyber Unit Leader Training
This course uses foundational concepts in the previous modules and has additional modules on Cyber Units, Red, Blue and Purple Team operations and adds additional concepts of Malware Reverse Engineering as well as Offensive Security topics that relate to various APT Group and Cyber Espionage as well as Hybrid Warfare detection using CyberNSight Premium
HDN Certified CyberNSight Analyst – Cyber Analyst on CyberNSight Platform
This Certification adds additional knowledge for any and all partners or customers that want to use CyberNSight or the Cynalsis Cyber Analyst Dashboard and HDN Cyber Intelligence Framework (TM, Copyright M. Goedeker / Hakdefnet 2019).
In this certification you will be tested in all Cybersecurity, C-OSINT, Darknet and all relevant areas of CyberNSight platform, API, Admin and Setup of the solution to support SOC / Purple Cyber Units and Corp Intelligence Departments.
This is the most comprehensive and challenging training and Certification of its kind in the Cyber Intel market.
Darknet Certified Analyst – using OSINT and CyberNSight for Darknet Research
Putting the foundational trainings and advanced modules prepares you in this training to do proactive research into the Darknet, Hidden Networks and also establishes research foundation topics to help you identify and find various pieces of information within these types of hidden and peer to peer based networks.
HDN Certified Cyber Auditor – Using ISO27001, CSF and HDN ODA Framework
This course is both for practical and also for partners that want to do ODA Framework based audits and assessments that we usually do for most customers before they choose security products or projects to start. It uses many different aspects of the NIST CSF, IRAMv2 and ISO2700X aspects along with our approach to audits.
All partners and people that want to do these audits have us verify the results MUST go through the foundation courses along with this one. This approach ensures a unified and repeatable and measurable audit, process and reports as well as value to customers.
HDN Certified Advanced Cyber Researcher – Cyber Risk Researching Fellow
This is the last Certification that we offer and it is very comprehensive as it also requires almost all the other modules before it. The aspect of this certification is simple, enable the people that take it to security research according to ours as well as the intelligence life-cycle based concepts.
This exam and certification require all students to do research and also present that research in our forums or at international security conferences of their choice (or ours)
For pricing and more information on the content of each course please