Live Training

We offer instructor-led courses focused on FireEye technology as well as vendor-agnostic cybersecurity training.

For smaller companies and teams, we offer a public training option, where attendees from multiple companies sit in on the same training session. Seats for our public ILT sessions can be purchased online; refer to our public training schedule for more information.

Private training sessions are available for teams of 5 or more. These courses can be delivered privately at your company’s facilities, or remotely via an online delivery system. Please contact your FireEye account manager for availability and pricing.

Alert Analysis with FireEye Email Security – Cloud Edition

This course is designed to prepare analysts to triage and derive meaningful, actionable information from alerts on FireEye File Protect. In a hands-on lab environment, learners will be presented with various alert types and real-world scenarios in which they will conduct in-depth analysis on the behavior and attributes of malware to assess real-world threats.

Alert Analysis with FireEye File Protect

This course is designed to prepare analysts to triage and derive meaningful, actionable information from alerts on FireEye File Protect. In a hands-on lab environment, learners will be presented with various alert types and real-world scenarios in which they will conduct in-depth analysis on the behavior and attributes of malware to assess real-world threats.

Alert Triage with FireEye Malware Analysis

This course is designed to prepare learners to perform alert triage from MVX engine analysis using the FireEye Malware Analysis appliance. Learners will develop knowledge and skills on the administration and use of the FireEye Malware Analysis appliance. The course offers a hands-on lab environment in which learners can submit malware samples for deep analysis and then interpret analysis results.

Cyber Threat Hunting

Cyber Threat Hunting is two-day in-class training on threat hunting. This course covers the fundamentals of threat hunting; how to build out a hunt program in your own environment; and how to identify, define, and execute a hunt mission. The course introduces essential concepts for network and endpoint hunting and then allows learners to apply techniques to hunt for anomalous patterns. Hands-on activities follow real-world use cases to identify attacker techniques. Learners will leave the course with concrete use cases that they can leverage to hunt in their own environment.

Cyber Threat Hunting Workshop

This course covers the fundamentals of building or refining a hunt program in your own environment around a defined process; how to create consistent practices to identify, define, and execute a hunt mission; and how to measure success of your hunting program.

FireEye Alert Analysis and Endpoint Investigations

This 3-day course examines how to triage alerts generated by FireEye Network Security, derive actionable information from those alerts, and apply the fundamentals of live analysis and investigation to investigate associated endpoints.

FireEye Email Security – Server Edition Administration and Diagnostics

This workshop introduces a framework for administration and diagnostics for the FireEye Email Security (EX) Server Edition. The course includes checklists, case studies, lab challenges and guidance for transitioning difficult cases to the FireEye support team. This workshop is experiential hands-on and will give learners experience in administering an appliance and diagnosing common issues

FireEye Endpoint Security Administration and Diagnostics

This course introduces deployment, configuration and basic administration for FireEye Endpoint Security. From this baseline, the workshop introduces a framework for troubleshooting the FireEye Endpoint Security Server and the FireEye agent. The course includes checklists, case studies and guidance for transitioning difficult cases to the FireEye support team. Optional modules expand this workshop to include FireEye core hardware and virtual appliances..

FireEye Helix

This four-day entry-level primer on FireEye Helix covers the Helix workflow, from triaging Helix alerts, creating and scoping cases and using Helix and Endpoint Security tools to conduct investigative searches across the enterprise.

FireEye Network Security Administration and Diagnostics

This workshop introduces a framework for administration and diagnostics for the FireEye Network Security (NX) appliance. The course includes checklists, case studies, lab challenges and guidance for transitioning difficult cases to the FireEye Support team.

Fundamentals of Network Traffic Analysis using FireEye Network Forensics

This course is designed to prepare analysts to triage and derive meaningful, actionable information from alerts on FireEye File Protect. In a hands-on lab environment, learners will be presented with various alert types and real-world scenarios in which they will conduct in-depth analysis on the behavior and attributes of malware to assess real-world threats.

Helix Threat Analytics

This course is designed to prepare analysts to triage and derive meaningful, actionable information from alerts on FireEye File Protect. In a hands-on lab environment, learners will be presented with various alert types and real-world scenarios in which they will conduct in-depth analysis on the behavior and attributes of malware to assess real-world threats.
Scroll to Top