The requested schedule is currently not available. Leave your contact details to send you schedule updates.
Two Teams, two different approaches, Red Team vs Blue Team Cyberwar Challenge! The cyber kill chain - reconnaissance, attack planning and delivery, system exploitation, privilege escalation and lateral movement, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indicators of the attack, and incident handling.
This is an ultimate aim to test organization’s’ security as well as ability to detect and respond to an attack. Challenge yourself and join the Red Team vs Blue Team Cyberwar Challenge!
hours
24
language
English
Summary
Two Teams, two different approaches, Red Team vs Blue Team Cyberwar Challenge! The cyber kill chain - reconnaissance, attack planning and delivery, system exploitation, privilege escalation and lateral movement, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indicators of the attack, and incident handling.
This is an ultimate aim to test organization’s’ security as well as ability to detect and respond to an attack. Challenge yourself and join the Red Team vs Blue Team Cyberwar Challenge!
Target Audience
Red team and blue team members, enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.
prerequisites
To attend this training, you should have a good understanding of basic security concepts, as well as, good hands-on experience in working with Windows and Linux infrastructure (as administrator or developer) . At least 5 years in the field is recommended..
Skills Gained
Analyze emerging trends in attacks
Identify areas of vulnerability within your organization
Prepare a risk assessment for your organization
Report and recommend countermeasures
Develop a threat management plan for your organization 6. Organize Red Team – Blue Team exercises
In this world where most of the things happen online, hacking provides wider opportunities for the hackers to gain unauthorized access to the unclassified information like credit card details, email account details, and other personal information. So, every red teamer and blue teamer should know the modern hacking techniques that are commonly used to get your personal information in an unauthorized way.
The term Cyber Kill Chain defines the steps used by cyber attackers in today’s cyber based attacks. The reconnaissance is the first phase, during which the attacker gathers information on the target before the actual attack starts. The data gathering is essential skill of every red teamer.
After successful data gathering, advanced attacker will prepare dedicated tools and attacks scenarios to increase chances of successful attack. For example, known vulnerability in identified product could be exploited in order to execute remote code or spawn remote shell into internal network. Without remote code execution vulnerability even the most sophisticated payload needs to be delivered to the victim. There are plenty of ways to achieve that but the final result often depends on social engineering skills
Stage-less and staged payloads / C&C
After successful delivery, malicious code often needs to exploits a vulnerability to execute code on victim’s system. There are multiple common patters to achieve that.
The successful exploitation attack often results in code execution with limited privileges. Gaining more privileges might be critical aspect of further operations.
The next step is a lateral movement that gives access to additional resources within the company and allows to spread all over the network. Attacker will also want to ensure persistency and possibility of returning to compromised hosts. Thus, even after attack is stopped and contained, it might be possible to return to the system and hide even better.
This part introduces the new cybersecurity challenges and trends, emphasizing on data security and integration through and into the cloud and the challenges of the coordination of the cloud and on-premise security solutions. Security is a business enabler, and it is only when it is viewed from a business perspective that we can truly make the right decisions. You will learn how to define values of your company which needs to be protected or restricted. You will know how to find obvious and not so obvious sensitive information which can be monetized by adversaries. Having that scope defined and knowing your resources you will know where the biggest gaps in your security posture are.
We can’t detect every kind of recon ops but it doesn’t mean we can’t detect some of them. It is crucial to understand what kind of information is publicly available and to learn how to protect that information by proactively analyzing network traffic. Attacker can use many different methods to deliver malicious payload. Blue team needs to ensure that even if delivered, payloads are detected and blocked at early stage.
Executed payload doesn’t have to mean that system is compromised. There are many mechanisms that, if properly configured, significantly reduce attack scope.
The chances of privilege escalation will be significantly reduced if the principle of least privilege will be properly used. The principle means giving a user account, service or process only those privileges which are essential to perform its intended function.
Internal network shouldn’t be treated as trusted. Plenty of things can go undetected if proper mechanisms aren’t deployed. Before red teamer can reach Domain Controller or other critical servers, blue team can implement numerous protections against that threat to detect and neutralize infected hosts.
Once attack is detected and neutralized, it is important to locate all other infected hosts. Attacker can leave multiple backdoors or intentionally introduce security problems. It is crucial to test entire environment for that threat.
minimize course outline
The requested schedule is currently not available. Leave your contact details to send you schedule updates.