Datasheet

Anomali University

<p>Anomali University (AU) is a service that offers courses designed by threat intelligence experts. Our courses cover an array of topics ranging from foundational information security concepts to advanced threat intelligence theories and their relevant applications. In addition, Anomali offers focused courses associated with how to most efficiently and effectively leverage our solutions.</p><p>Clients can take advantage of these courses to help:</p><ul><li>Enhance your skills using the Anomali Altitude platform</li><li>Ensure that they are using Anomali in a manner that can provide the greatest impact based on their operational goals</li><li>Keep their professional certifications up to date by taking courses eligible to earn for CEU credits through the Anomali Verified program</li><li>Obtain a broader understanding of threat intelligence and its applications</li><li>Refresh/expand their existing knowledge base</li><li>Train new staff that are entering the information security and threat intelligence arena</li></ul><p>Our platform boasts:</p><ul><li>Self-paced courses — allowing you to view courses and materials on your own schedule</li><li>Interactive activities, demos, knowledge checks, and practical exercises</li><li>A mobile app for iOS and Android devices</li></ul><h2>Anomali Courses</h2><p>These are in-depth courses that walk you through all of the features and functionality in the platform. These courses have been designed to accommodate all types of learners. You control the pace of each module and can complete the training on your own schedule. These courses boast a range of interactive activities, including demos, knowledge checks and exercises for you to practice what you have just learned. Simple enough for beginners, powerful enough for experts.</p><h3>— ThreatStream for End Users</h3><p><em>5 hours</em></p><p>This course familiarizes a security practitioner with various components of the Anomali ThreatStream. Learn how to navigate the user interface, recognize what data can be imported, and determine how Intel can become part of your ThreatStream instance, enrich and share safely outside your Organization.</p><h3>— ThreatStream for Administrators</h3><p><em>1 hour</em></p><p>This course is designed for administration engineers and end-users, focusing on settings and features only available to ThreatStream users with Organization Administrator profile.</p><h3>— Integrator Fundamentals</h3><p><em>4 hours</em></p><p>This course has been designed for administration engineers and end-users wishing to learn the installation and configuration process of Anomali Integrator Standard Edition.</p><h3>— Anomali Match</h3><p><em>6 hours</em></p><p>This course familiarizes security practitioners with various components of the Anomali Match. Learn the fundamental concepts: navigate the interface, search and view Threat Intelligence, perform retrospective searches, pivot from an indicator to view gaps in your intelligence and learn how to trigger alerts.</p><h3>— Anomali SDK Suite</h3><p><em>1 hour</em></p><p>An overview of the Software Development Kits Anomali provides.</p><h2>Fast-Track Courses</h2><p>Fast Track courses provide best practices to integrate the Anomali Altitude platform into your organizations’ workflows. These courses are focused videos, exploring real-world examples.</p><h3>— ThreatStream</h3><ul><li>ThreatStream Analyst Workflows Fast Track<ul><li>Feedback Loop</li><li>Phishing Emails</li><li>Threat Research and Production</li></ul></li><li>More Fast Track Courses are coming soon.</li></ul><h2>Anomali Verified ✔</h2><p>Do you hold an industry certification that requires renewal (CEU/CPE) credits to keep the credential up-to-date? Do you want to prove that you understand how to use the tools that you learned about in this lesson? You should sign up for the <strong>Anomali Verified ✔</strong> program for eligible courses. While Anomali provides access to our product training content via Anomali University, we also recognize that some customers want to go to the next level and show their understanding of the course content to certification providers, employers, and peers in the cyber-security field. We’ve designed <strong>Anomali Verified ✔</strong> to test the knowledge that you have gained in this course through a comprehensive assessment and meet the documentation requirements of the major cyber-security certification organizations.</p><h2>Threat Intelligence Courses</h2><p>These are in-depth courses that walk you through all of the features and functionality in the platform. These courses have been designed to accommodate all types of learners. You control the pace of each module and can complete the training on your own schedule. These courses boast a range of interactive activities, including demos, knowledge checks and exercises for you to practice what you have just learned. Simple enough for beginners, powerful enough for experts.</p><h3>— Threat Intelligence Fundamentals</h3><p>This course focuses on advanced concepts of Threat Intelligence. You will explore the various Industry-leading Threat Models / Taxonomies for classifying and managing Threats. Understand the pros/cons of each and when to best use.</p><h3>— Applied Threat Intelligence Fundamentals</h3><p>This course focuses on advanced concepts and the application of Threat Intelligence and is a continuation of Threat Intelligence Fundamentals. You will explore various Threat Model distribution options.</p>