Red team vs. blue team – a hands on lesson in self-defense

Choose ticket:


TICKET CHICAGO - Red team vs. blue team – a hands on lesson in self-defense

All inclusive:
- $4995
- Hotel (5 nights)
- Food
- Training
- Fun happenings

When clicking Order now you will be sent to the Truesec checkout page on www.truesec.com

Intro

We regularly work hands-on, knee-deep, with Cyber Incidents, where we help mid- to enterprise-sized companies and organizations who are victims of Cyberattacks. This gives us a unique insight into how attackers operate, and the most common mistakes IT departments and humans do.

Class Overview

Traditional security approaches have focused on using the organization’s network as the primary security perimeter. However, in today’s world, network security is often bypassed, primarily when data and resources are hosted outside the traditional network boundary. Or when the adversaries obtain access to workstations inside the network boundary through phishing and other attacks. Cyberattacks target accounts and other elements of privileged access to rapidly gain access to targeted data and systems using various tools and skillsets to perform credential theft and reuse attacks like token manipulation, pass-the-hash, and pass-the-ticket. 

In this training, you learn the modus operandi of attackers, how they identify vulnerabilities and exploit them to take control of your enterprise environment, for example, to steal data or launch ransomware attacks. You will also learn how to detect hackers’ activities and how to protect your environment using built-in security features in Windows Client and Server, as well as those in Azure and Microsoft 365, maximizing your investments in the Microsoft platform. 

It is a unique hands-on lab for IT pros and IT managers that covers all aspects of Windows Enterprise security regarding cyberattacks and defenses. During this week, you will participate in simulated attack and defense exercises as Blue and Red Team members. This will give you the insights into how an attacker thinks, operates and their tooling as well as how to detect, protect and respond to Cyberattacks.

Instructors discuss protection and mitigation strategies for each attack scenario covered in the training, based on their extensive real-world experience and knowledge. Using examples from incidents, attacks, and red team assignments, they demonstrate the importance of governing privileged access and how it minimizes your organization’s attack surface and thwarts in-progress attacks. 

Key players of the Truesec Cybersecurity team, consisting of both red and blue team members and other security experts, developed this unique training based on real-world experience from numerous incident response cases, penetration tests, security health-checks, red team activities, and security design and architecture projects. They include some of the world’s leading security experts, Cloud and Enterprise Security MVPs, and recognized Microsoft speakers. 

Details

Level

300 (Advanced)

Certification

You will receive an Education Certificate after graduation.

Who Should Attend?

IT technicians, administrators, architects, and “technically focused” IT managers who want to learn more about Cybersecurity with a focus on Microsoft security.

Prerequisite knowledge

Good IT knowledge in enterprise environments and in Windows systems, with some experience of administrating cloud services.

Goal

After taking this course, you will fully understand the threats of today and be able to swiftly implement security controls that are proven to defend your Microsoft infrastructure effectively in the real world. You will take home key knowledge based on the instructors’ many years of experience helping customers in the field investigate and mitigate security challenges. 

Material

Recorded sessions, notes, tools and a lot of knowledge and best practices

Hands on Labs

Over 60 percent of the time you spend in class is dedicated to hands-on in simulated attack and defense exercises as Blue and Red Team members with the task of attack and defend your enterprise lab environment.

Lead Instructors

Hasain Alshakarti