Knowledge about current and future cyber attacks is just as important for SOC teams/employees as is the testing of processes and ways to effectively fend them off.
In our Blue Team Basic Online course, you will train to identify incidents quickly, eliminate them permanently from the network and close attack vectors. You practice and optimize processes, receive new impulses through best practices and are thus better equipped to fend off attacks rapidly, effectively and sustainably.
You can expect an overview on typical vulnerabilities, future attack scenarios and demonstrate new cyber security solutions.
A practice-oriented, hands-on online training on the Cyber Range, group work, structured feedback, lectures and knowledge transfer, discussions, best practices, demos. Strengthening skills of the team and individual team members.
Blue Team Basic Online - for SOC teams/employees
Is based on two components:
Over the course of three days, you will
In doing so, you are supported by trainers and are exposed to real malware - in an environment that, in contrast to real-time operations, can be reset at the touch of a button. This also allows you to explore the implications of different paths of the same scenarios.
In complementary lectures, you will receive an overview of current and future attack scenarios, vulnerabilities, next generation vulnerabilities and latest tools and trends in network security as well as best practices.
Please note – end times can differ slightly as they depend on the speed in which participants master scenarios. Consequently, we may shift content between the training days.
Introduction
Group work/training of attack scenarios on the Cyber Range platform
Knowledge transfer: Cyber attacks - today and tomorrow / typical attack vectors
Structured feedback and debriefings
Group work/training of attack scenario on the Cyber Range platform including testing the effectiveness and efficiency of different approaches
Structured feedback and debriefings
Group work/training of attack scenario on the Cyber Range platform
Trends and State-of-the-Art solutions
Structured feedback and debriefings
Review/reflection on the learning outcomes and final discussion
You should be familiar with the functioning of firewalls and SIEM systems, in particular
If you have further questions, please do not hesitate to contact us.
The Cyber Range training will be conducted on the cyber training and simulation platform. For more engagement with our attendees in the online trainings we will use the online conferencing tool MS Teams in addition to facilitate talk, chat and lectures.
3-5 day training with more complex scenarios for higher demands on analytical skills and problem-solving competence in coping with real attack situations.
Think like an attacker to be a world-class defender! This training is a role-play where two teams will take turns to operate as attackers or defenders.
Attacking by the Red Team and defending by the Blue Team in real time is the goal of this module.
A deep dive into the analysis of infection routes, creating persistence and removing malware.
In this course you will learn what to do if Industrial Control Systems/Operational Technology have been compromised.
You want to customize your training to your specific needs? No problem! Let us create a customized offer for your security team!
Training can be offered as online or face-to-face training.