Mandiant Academy Cyber Security Training
Bridge your organization's cyber security skills gap with Mandiant Academy's elite mix of training courses, certifications and real-world exercises led by top experts in the field.
A range of education formats to suit many learning styles and organizational needs
Hands-on learning, training and development from frontline cyber experts
Learning for All Levels
Training for all levels, from beginner to advanced
Diverse Selection of Formats
Personalized learning starts with education formats that suit various situations and student learning styles, along with an option of customization, to meet the specific goals of your security team.
Take our web-based training courses anytime, anywhere.
Access that fits your own schedule
Best practice cyber intelligence frameworks and operations
Private and public courses delivered on-premise and remotely to individual security professionals and organizational teams.
Frontline expert instructors
Reality-based case studies
Hands-on keyboard exercises
Sign up for a free, sneak preview of three cyber intelligence courses:
Foundations: Introduction to Intelligence Requirements
Foundations: The Intelligence Lifecycle
Research: What is a Branch Model
Featured Training Tracks
Mandiant Academy is your one-stop training shop offering a variety of public classes for small groups or individuals, and private courses for your organization's dedicated team.
Incident Response Training
Students gain first-hand knowledge of attacker tactics, techniques and procedures (TTPs), tools and malware to apply on the job.
Cyber Security Training
Learn about best-practice intelligence frameworks, attacker tradecraft, remote file inclusion (RFI) analysis, investigation lead development, and more.
Our rigorous certifications program includes proctored examinations and a role-based model that trains your security teams in incident response and threat intelligence analysis. This evaluation will upskill your security team’s investigation, analysis, and response capabilities against real-world cyber incidents.
Effective CTI training describes threat attribution methodology and proper intelligence handling. It covers the main components and characteristics of a cyber threat group and examines operational and strategic intelligence from an attacker’s point of view.
Effective IR training covers investigative techniques and processes required to effectively detect, contain and remediate a cyber security incident. It describes common forms of endpoint, network and file-based forensic evidence collection. It explains the phases of a targeted attack life cycle and principles of analysis, along with short- and long-term strategies to improve enterprise response and security resilience.
Effective threat intelligence analysis training describes how to use raw tactical threat intelligence to weigh connections and relationships to build a set of related activities that correspond to a group of threat actors. It covers factors to consider when researching attacker activity for help determining the who and why behind a cyber attack.