* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download D efe ns iv
Survey
Document related concepts
Deep packet inspection wikipedia , lookup
Mobile device forensics wikipedia , lookup
Unix security wikipedia , lookup
Mobile security wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Security-focused operating system wikipedia , lookup
Cyberwarfare wikipedia , lookup
Network tap wikipedia , lookup
Wireless security wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer security wikipedia , lookup
Cyberattack wikipedia , lookup
Transcript
D ef en si v e Co un t This is a 2-week er follow-on course to DCCO-I and is Cy b particularly focused on er taking the hunting aspects to the O next level. The course is intended to pe teach defensive cyber operators the over- ra arching capabilities associated with all phases of to exploitation. Students will learn more sophisticated hacker exploitation techniques, primarily against emergent rH technologies and infrastructure. Students will be exposed to router and firewall exploitation techniques, embedded device un t exploitation, wireless exploitation, and advanced network forensic (D identification. These methods include tunneling traffic through normal security filters, devices, and defenders, anonymizing IP addresses, creating forged packets, deciphering encrypted and hidden data exfiltration techniques, and uncovering CC O -H ) sophisticated backdoor techniques. Students will depart this course with an understanding of advanced techniques used by the most sophisticated attackers to maintain stealth and security while minimizing their footprint and identity. Locating the Cyber Ninja Emergent Technologies and Critical Infrastructure - Creating an anonymous environment - Firewall Exploitation and Defensive Security - Fingerprinting the attack - Router Exploitation and Secure Deployment - Recovering tunneling and redirection techniques - Wireless Exploitation and Protection, Perseverance - Locating network scans that fly under the radar - Embedded Devices; Developing Firmware-based Exploits - Identifying forged packets - Extracting covert, obfuscated data from network traffic - Uncover sophisticated implants - Performing anomaly detection - Implanting multi-layered security - Monitoring cleaning techniques 5755 Mark Dabling | Suite 250 3463 Magic Drive | Suite 225 [email protected] Colorado Springs | CO | 80919 San Antonio | TX | 78229 www.root9b.com USA ONLY