Download D efe ns iv

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Deep packet inspection wikipedia , lookup

Mobile device forensics wikipedia , lookup

Unix security wikipedia , lookup

Mobile security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Security-focused operating system wikipedia , lookup

Cyberwarfare wikipedia , lookup

Network tap wikipedia , lookup

Wireless security wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer security wikipedia , lookup

Cyberattack wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
D
ef
en
si
v
e
Co
un
t
This is a 2-week
er
follow-on course
to DCCO-I and is
Cy
b
particularly focused on
er
taking the hunting aspects to the
O
next level. The course is intended to
pe
teach defensive cyber operators the over-
ra
arching capabilities associated with all phases of
to
exploitation. Students will learn more sophisticated
hacker exploitation techniques, primarily against emergent
rH
technologies and infrastructure. Students will be exposed
to router and firewall exploitation techniques, embedded device
un
t
exploitation, wireless exploitation, and advanced network forensic
(D
identification. These methods include tunneling traffic through normal
security filters, devices, and defenders, anonymizing IP addresses, creating forged
packets, deciphering encrypted and hidden data exfiltration techniques, and uncovering
CC
O
-H
)
sophisticated backdoor techniques. Students will depart this course with an understanding
of advanced techniques used by the most sophisticated attackers to maintain stealth and security
while minimizing their footprint and identity.
Locating the Cyber Ninja
Emergent Technologies and Critical Infrastructure
- Creating an anonymous environment
- Firewall Exploitation and Defensive Security
- Fingerprinting the attack
- Router Exploitation and Secure Deployment
- Recovering tunneling and redirection techniques
- Wireless Exploitation and Protection, Perseverance
- Locating network scans that fly under the radar
- Embedded Devices; Developing Firmware-based Exploits
- Identifying forged packets
- Extracting covert, obfuscated data from network traffic
- Uncover sophisticated implants
- Performing anomaly detection
- Implanting multi-layered security
- Monitoring cleaning techniques
5755 Mark Dabling | Suite 250
3463 Magic Drive | Suite 225
[email protected]
Colorado Springs | CO | 80919
San Antonio | TX | 78229
www.root9b.com
USA ONLY