Mile2’s Ultimate Red vs Blue Team Course is built to provide intense hands-on sessions that emulates real-world cyber warfare and defense scenarios. You will implement principles and behaviors you have learned to combat malicious hackers that use advanced threat techniques.
The intent is that the students will have 3 – 4 hours to interact with each section. In the Day 1 Morning scenario, you will access Proximo and Gracchus. The Day 2 Afternoon work will be in Priscus and Verus. Then, in the Day 2 Morning scenario you will access Maxiums and Quintas. Finally, Day 2 Afternoon work will be in Tetraites and Cummodus.
In each segment of Red vs Blue you will have the first 30 minutes to organize your team. After this, you will have up to 3 hours and 30 minutes to attack the other machines and to place your team name in the flag.txt file. Once a team name is in the flag.txt file, it cannot be removed. The team that places their team name in as many flag.txt files as possible will be the winning team for that segment.
Live Class Duration: 2 Days
Language: English
Class Formats:
* Instructor-led
* Live Virtual Training
Suggested Prior Knowledge:
* Networking
* Understanding Scanning and Vulnerabilities
* Network Technologies
* TCP/IP
* Microsoft Packages
* Basic Linux knowledge
CPEs: 24
Participants in Red vs Blue will be using both open source and commercial tools in a controlled virtual cyber range. Some tools/applications that will be used are nmap, db-exploit, Metasploit through Kali Linux, Empire, and Microsoft PowerShell.
* Penetration Testers
* Microsoft Adminstrators
* Security Administrators
* Cybersecurity Engineers
MORNING
Required VMs:
• Kali-RvB
• Win10-RvB
• Proximo (Linux)
• Gracchus (Linux)
Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.
AFTERNOON
Required VMs:
• Kali-RvB
• Win10-RvB
• Priscus (Windows 7)
• Verus (Windows XP)
Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.
MORNING
Required VMs:
• Kali-RvB
• Win10-RvB
• Paximus (Linux)
• Quintus (Linux)
Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.
AFTERNOON
Required VMs:
• Kali-RvB
• Win10-RvB
• Tetraites (Windows 2K12)
• Commodus (Windows 10)
Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.
Graduates of mile2’s Red vs Blue Team scenario-based events will:
1. Become more versed with tools and applications, such as Metasploit, Kali Linux and Microsoft PowerShell.
2. Piece together a team that will focus on attack-based skill sets.
3. Assess existing penetration testing and incident response teams.
4. Prevent and defend against cyber-attacks.
Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.
Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range. We train students in penetration testing,disaster recovery, incident handling, and network forensics. Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.