Workshop

CYBADE

Windows Domain Hacking & Security Hands-On («CYBADE»)

In this hands-on workshop, you will learn about the attackers' current techniques and tools (offensive). In addition, defensive aspects to detect the attacks will be highlighted and measures to prevent the attack techniques will be worked out together.
Duration 3 days
Price 3'900.–
Course documents Digital courseware

Course facts

  • Listing at least three actors and their motivation regarding cyber threats
  • Setting up a lab environment (Windows Active Directory) to simulate/practise common attacks
  • Learning where to find the Enterprise Matrix of the MITRE ATT&CK® Framework
  • Navigating within the matrix and filtering out the relevant techniques
  • Naming the 12 tactics of the ATT&CK Matrix for Enterprise
  • Describing at least three techniques per tactic and trying out possible attacks in the lab
  • Identifying the possible detection and countermeasures for the tested attacks
  • Using the MITRE ATT&CK® framework (https://attack.mitre.org), you will learn the tactics and techniques used by cybercriminals. 
  • The ultimate opportunity to learn the attackers' tools in a lab environment (Windows Active Directory environment with client and servers).
  • Attack simulations on common IT infrastructure of companies are performed
  • Guided exercises allow you to try out the techniques relevant to you and your company
  • Together with the other course participants, possible detection and countermeasures to the attacks are developed
  • In the big final challenge, the complete kill chain of a cyber attack is played out on the basis of a concrete case.

Component of the following courses

This workshop includes active teaching conversations with the participants, reflection and exchange of experiences from own practice in the context of theory and guided exercises in a hands-on lab environment.

This workshop is designed for information security managers, information system architects, security testers, security auditors, security consultants, security engineers, network engineers, and system administrators.

Attendance of the following courses or equivalent broad hands-on hacking experience with KALI Linux. Good knowledge of Windows (configuration and maintenance of Windows servers, Active Directory infrastructure, GPO, AppLocker, Windows Eventlog, PowerShell, Sysmon, SysInternals, etc.) is a plus.

Download

Questions

Further courses