Voice Vigilance: Vishing Defense Training
Beginner, Intermediate, Advanced Amy Burks Beginner, Intermediate, Advanced Amy Burks

Voice Vigilance: Vishing Defense Training

Protect your call center from vishing attacks with Voice Vigilance: Vishing Defense Training. This expert-led, customizable program equips your team with the skills to detect, prevent, and respond to voice phishing threats. Engage in hands-on simulations and scenario-based exercises tailored to your call center’s unique challenges. Enroll now to enhance your security and reduce risks, with potential reimbursement grants available.

Read More
AI & Cybersecurity Leadership: Navigating Risk & Opportunities
Beginner, Intermediate, Advanced Amy Burks Beginner, Intermediate, Advanced Amy Burks

AI & Cybersecurity Leadership: Navigating Risk & Opportunities

Empower your leadership with advanced AI and cybersecurity skills in this immersive four-day course. Tailored for executives and board members, this training covers strategic planning, risk management, and stakeholder engagement, equipping you to lead confidently in today’s digital landscape. Enroll now to align AI and cybersecurity with your business goals, with potential reimbursement grants reducing costs by up to 75%.

Read More
GRC: Governance, Risk, and Compliance Training
Beginner, Intermediate, Advanced Amy Burks Beginner, Intermediate, Advanced Amy Burks

GRC: Governance, Risk, and Compliance Training

Elevate your GRC skills with tailored training designed for industry professionals. Master GRC offers expert-led, hands-on courses to enhance your governance, risk management, and compliance capabilities. Enroll now to gain practical, industry-specific insights and advanced technical knowledge, with potential reimbursement grants reducing costs by up to 75%.

Read More
Powershell: Automation Essentials
Beginner, Intermediate, Advanced Amy Burks Beginner, Intermediate, Advanced Amy Burks

Powershell: Automation Essentials

PowerShell Prologue is an introductory course designed to equip participants with the fundamental knowledge and skills needed to harness the power of PowerShell for automating tasks and managing Windows systems efficiently. Through hands-on exercises and practical examples, students will learn how to navigate the PowerShell environment, write basic scripts, and leverage core functionalities to streamline routine operations.

Read More
Open-Source Intelligence 101: Fundamentals
Beginner, Intermediate, Advanced Amy Burks Beginner, Intermediate, Advanced Amy Burks

Open-Source Intelligence 101: Fundamentals

This 3-day course aims to develop the fundamentals of open-source intelligence (OSINT) across the Business, Military, and Law Enforcement sectors. By training participants in OSINT collection, processing, exploitation, analysis, and production, the course enables informed decision-making, strengthens intelligence operations, and improves risk assessment. It empowers professionals in various fields to gather and analyze publicly available information effectively, enhancing business decisions, threat assessments, crime prevention, security measures, investigations, and cybersecurity. Overall, this training promotes intelligence-driven approaches and enhances information gathering and analysis across sectors.

Read More
Open-Source Intelligence 102: Predictive Analysis
Beginner, Intermediate, Advanced Amy Burks Beginner, Intermediate, Advanced Amy Burks

Open-Source Intelligence 102: Predictive Analysis

Learn about Open Source Predictive Analysis: Intelligence analysts will gain knowledge and skills in utilizing open source intelligence (OSINT) for predictive analysis, enabling them to assess future threats and trends based on available information. Law enforcement, security personnel, and cybersecurity professionals will understand how to apply predictive analysis techniques to anticipate criminal activities and potential cybersecurity threats. Military personnel can enhance their understanding of adversary networks and operations through predictive analysis. Corporate intelligence professionals can utilize open source predictive analysis to anticipate market conditions, competitor actions, and potential risks. Researchers, journalists, digital forensics professionals, and private investigators will develop the ability to uncover hidden connections, predict trends, and provide insightful reports using open source predictive analysis techniques.

Read More
Open Source Intelligence 103: Network Engagement
Beginner, Intermediate, Advanced Amy Burks Beginner, Intermediate, Advanced Amy Burks

Open Source Intelligence 103: Network Engagement

Learning how to conduct open source network engagement through OSINT classes is crucial for various professionals in intelligence analysis, law enforcement, military, corporate intelligence, research, journalism, digital forensics, and private investigation. These classes provide valuable skills and techniques for gathering information from open sources, analyzing networks effectively, and assessing threats. Professionals can leverage OSINT to understand network engagement tactics, identify adversary networks, and develop strategies for engagement and risk management. Additionally, OSINT training enhances investigative skills by enabling individuals to gather information, analyze networks, track individuals, and provide comprehensive reports. By acquiring these skills, professionals can make informed decisions, support investigations, and contribute more effectively to their respective fields.

Read More
Open-Source Intelligence 104: Collections Management
Beginner, Intermediate, Advanced Amy Burks Beginner, Intermediate, Advanced Amy Burks

Open-Source Intelligence 104: Collections Management

Open-source collections management through OSINT classes is essential for professionals in intelligence analysis, law enforcement, military, corporate intelligence, research, journalism, digital forensics, and private investigation. These classes offer valuable skills for gathering information from open sources, analyzing networks, and assessing threats effectively. The training optimizes data gathering, storage, and analysis processes, benefiting various industries. Intelligence and security sectors gain efficient collection, categorization, and analysis of intelligence data. The cybersecurity industry organizes and manages cybersecurity-related data for threat detection and response. Military and defense sectors make data-driven decisions during missions. Businesses benefit from organizing market data, customer information, and competitive intelligence. Law enforcement agencies handle evidence and case-related data efficiently, while museums preserve artifacts and historical documents effectively.

Read More
Malware Analysis
Beginner Amy Burks Beginner Amy Burks

Malware Analysis

Take a deep dive in the functionality, origin and potential impact of a given malware sample such as a virus, worm, trojan horse, rootkit, or backdoor.

Read More
GRC Analyst
Advanced, Intermediate, Beginner Amy Burks Advanced, Intermediate, Beginner Amy Burks

GRC Analyst

Forge Institute is offering this five-day course to equip GRC analysts with the ability to assess and document an organization’s compliance and risk posture through accurately reviewing its information assets. Using both an informative and hands-on approach, participants will learn how to analyze contracts & third party vendors to effectively identify, mitigate and reduce risks. In addition, participants with gain the skills needed to examine & audit current policies and procedures to support more risk-aware decisions across workspaces.

Read More
Blue Team Operations
Advanced, Beginner, Intermediate Amy Burks Advanced, Beginner, Intermediate Amy Burks

Blue Team Operations

Forge Institute is offering this four-day training course to teach you everything you need to know about what constitutes a cybersecurity event, incident, and attack; leveraging log review, threat hunting, and incident response TTPs. This training aids in the development of advanced blue team operators through the understanding of hardening operating systems, applying network security and intrusion detection tools that protect and defend critical networks.

Read More
Adversary Tactics: Red Team Operations
Advanced, Intermediate, Beginner Lee Watson Advanced, Intermediate, Beginner Lee Watson

Adversary Tactics: Red Team Operations

Forge Institute is offering this four-day training course to teach you everything you need to know about Red Team Ops, emerging into the minds of cyber hacker’s leading-edge tactics, techniques, and procedures. We’re bringing in some of the best instructors who have taught hundreds of cyber operators to guard against skilled adversaries and conducted offensive and defensive cyber throughout their careers.

Read More