Inside Security Academy

Faculty instructors share key takeaways from their courses aligned to five core security functions.

Ismael Valenzuela, Practical Threat Modeling with MITRE ATTACK

Security Operations

In this hands-on course, Ismael Valenzuela will show participants how to systematically analyze their defensive posture, how to prioritize threat hunts based on actionable threat intelligence, and how to architect for visibility and detection using MITRE ATT&CK based analytics. This course will demonstrate how to do practical threat modeling, run analytics and generate visualizations that can help identify weak points and prioritize cyber defense strategy.
Get Started

Architecture & Engineering

In this course, Faculty Wolf Goerlich, will engage participants in hands-on exercises exploring push fatigue, bombing, phishing, and proxy attacks. This course is designed to provide participants with a comprehensive understanding of these attacks along with real-world examples of MFA countermeasures. Participants will gain a deeper understanding of this crucial front-line control and the practical skills needed to harden their organization's MFA implementation.
Get Started
Wolf Goerlich, MFA: Common Attacks and Defenses
Jodi Daniels, Data Inventory and Individual Rights

Governance, Risk, and Compliance

This class will introduce its participants to two privacy program fundamental concepts: data inventories and individual rights requests.  Participants will walk away with a solid understanding of what these two concepts are and how to successfully conduct them within their organization.
Get Started

Cloud Security

This course will teach participants how to build a well architected 3-tier application in AWS Cloud with the resilience, scalability, and elasticity of Cloud Native capabilities of AWS. Participants will be taught the role of security services in AWS and the gaps that are left behind by an AWS native solution. Participants will also be participating in 2 easy labs to create their 3-tier application in AWS Cloud with the foundational AWS security services integrated. 
Get Started
Ashish Rajan, Building a Well Architected Application in AWS
Nicole Dove, BISO: Your Cybersecurity Secret Weapon

Business Skills

As technology becomes more vital to business, cybersecurity is increasingly a top priority. Many business leaders aren’t tech experts, creating a gap between business goals and security needs. This course introduces the Business Information Security Officer (BISO)—a rising role that bridges that gap. Students will explore why BISOs matter, what to look for in the hiring process, and how they can become key players in protecting organizations.
Get Started