Get in Touch

Course Outline

Module 1: Understanding the cyber-security landscape

In this module, you will explore the current cybersecurity landscape and learn how adopting the assume compromise philosophy can restrict an attacker’s ability to move laterally between information systems and escalate privileges within them. The modern cyber-security landscape is vast and likely impossible for any single individual to fully comprehend. However, there are critical aspects of this landscape that those interested in enterprise security fundamentals should prioritize.

Lessons

  • Current Cyber-security Landscape
  • Assume Compromise Philosophy

After completing this module, students will be able to:

  • Describe the current cybersecurity landscape.
  • Explain the Assume Compromise Philosophy.
  • Identify factors that contribute to the cost of a breach.

Module 2: Red Team: Penetration, Lateral Movement, Escalation, and Exfiltration

Red Team versus Blue Team exercises involve simulating attacks against an organization’s information systems. The Red Team simulates and, in some cases, executes proof-of-concept steps representing an attack against the organization’s IT systems, while the Blue Team simulates the response to that attack. This adversarial approach not only helps identify security vulnerabilities in IT system configurations but also enables the information systems staff to learn how to detect and respond to attacks. In this module, you will learn the Red Team versus Blue Team approach to detecting and responding to security threats.

Lessons

  • Red Team versus Blue Team Exercises
  • The Attackers Objective
  • Red Team Kill Chain

After completing this module, students will be able to:

  • Distinguish between responsibilities of red teams and blue teams.
  • Identify typical objectives of cyber attackers.
  • Describe a kill chain carried out by red teams.

Module 3: Blue Team Detection, Investigation, Response, and Mitigation

In this module, you will learn about the roles and goals of the Blue Team within attack exercises. You will understand the structure of an attack against an objective (Kill Chain) and methods to limit how an attacker can compromise unprivileged accounts. Additionally, you will learn about techniques to restrict lateral movement—preventing attackers from using a compromised system to attack others—and how telemetry monitoring is utilized to detect attacks.

Lessons

  • The Blue Team
  • Blue Team Kill Chain
  • Restricting Privilege Escalation
  • Restrict Lateral Movement
  • Attack Detection

After completing this module, students will be able to:

  • Describe the roles, goals, and kill chain activities of the blue team in red team exercises.
  • Describe the structure of an attack against an objective (Kill Chain).
  • Describe methods to limit how an attacker can compromise unprivileged accounts.
  • Describe the methods used to restrict lateral movement.
  • Describe how telemetry monitoring is used to detect attacks.

Module 4: Organizational Preparations

Organizations can take several ongoing steps to improve their overall information security approach. This module provides a closer look at some of these preparations. You will learn about a conceptual model for thinking about information security and how to approach it properly, ensuring your organization adopts a deliberate strategy for information security.

Lessons

  • CIA Triad
  • Organizational Preparations
  • Developing and Maintain Policies

Lab : Designing a Blue Team strategy

After completing this module, students will be able to:

  • Explain the concept of Confidentiality, Integrity, and Availability (CIA) triad.
  • Describe the primary activities that should be included in organization preparations.
  • Identify the main principles of developing and maintaining policies.

After completing this lab, students will be able to:

  • Design a high-level approach to mitigating threats
  • Recommend tools and methodology facilitating tracking down origins of cyberattacks
  • Provide high level steps of a recovery effort
  • Recommend methods of preventing cyberattacks
  • Describe regulatory challenges that result from malware exploits

Requirements

In addition to professional experience, students enrolling in this training should already possess the following technical knowledge:

  • Familiarity with the current cyber-security ecosystem
  • Understanding of hacking techniques targeting computers and networks
  • Knowledge of basic Risk Management
 7 Hours

Testimonials (2)

Upcoming Courses

Related Categories