Cyber Warfare – Red vs Blue

1,525.00

Key Course information:

Duration: 5 days
Language: English
Class formats:

  • Instructor-led
  • Self-Study
  • Live Virtual Training

Suggested Prior Knowledge: CHT, COST or equivalent knowledge.
Applicable Exams:
Mile2 C)NP
Network+
CPEs: 40

Categorieën: ,

Mile2’s Ultimate Red vs Blue Team course is build to provide intense hands-on sessions that emulates real-world cyber warfare and defense scenarios. You will implement principles and behaviors you have learned to combat malicious hackers that use advanced threat techniques.

The intent is that the students will have 3-4 hours to interact with each section. In the Day 1 Morning scenario you will access Proximo and Gracchus. The Day 1 afternoon work will be in Priscus and Verus. Then in the Day 2 Morning scenario you will acces Maximus and Quintus. Finally, Day 2 Afternoon work will in in Tetraites and Commodus.

In each segment of Red vs Blue you will have the first 30 minutes to organize your team. After this you will have up to 3 hours and 30 minutes to attack the other machines and to place your team name in the Flag.txt file. Once a team name is in the Fag.txt file it cannot be removed. The team that places their name in as many flag.txt files as possible will be the winning team for that segment.

Key Course information:

Duration: 2 days

Language: English

Class formats:

  • Instructor-led
  • Live Virtual Training

Suggested Prior Knowledge:

  • Networking
  • Understanding Scanning and Vulnerabilities
  • Network Technologies
  • TCP/IP
  • Microsoft Packages
  • Basic Linus Knowledge

CPEs: 24

Modules:

    • Module 1: Kali vs Proximo and Gracchus
    • Module 2: Kali vs Priscus and Verus
    • Module 3: Kali vs Maximus and Quintus
    • Module 4: Kali vs Tetraites and Commodus

Who should attend:

  • Penetration Testers
  • Microsoft Administrators
  • Security Administrators
  • Cybersecurity Engineers

Tools and Applications:

Participants in Red vs Blue will be using both open source and commercial tools in a controlled virtual cyber range. Some tools/applications that will be used are nmap, db-exploit, Metasploit through Kali Linux, Empire and Microsoft Power-Shell.

Red vs Blue Day 1 Format:

MORNING

Required VMs:

  • Kali – RvB
  • Win 10 – RvB
  • Proximo – Linux
  • Gracchus – Linux

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the scenario. If possible, sever acces to your systems from the other teams if they are connected.

AFTERNOON

Required VMs:

  • Kali – RvB
  • Win 10 – RvB
  • Priscus (Windows 7)
  • Verus (Windows XP)

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the scenario. If possible, sever acces to your systems from the other teams if they are connected.

Red vs Blue Day 2 Format:

MORNING

Required VMs:

  • Kali – RvB
  • Win 10 – RvB
  • Paximus (Linux)
  • Quintus (Linux)

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the scenario. If possible, sever acces to your systems from the other teams if they are connected.

AFTERNOON

Required VMs:

  • Kali – RvB
  • Win 10 – RvB
  • Tetraites (Windows 2K12)
  • Commodus (Windows 10)

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the scenario. If possible, sever acces to your systems from the other teams if they are connected.

RED vs BLU: End Goals

Graduates of Mile2’s Red vs Blue Team scenario-based events will:

  1. Become more versed with tools and applications, such as Metasploit, Kali Linux and Microsoft PowerShell.
  2. Piece together a team that will focus on attack-based skill sets.
  3. Assess existing penetration testing and incident response teams.
  4. Prevent en defend against cyber-attacks.