11
1 © Life Cycle Institute © Life Cycle Institute Hack Warz® Cyber Attack A Hands-On Lab for Network Defenders

Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

Embed Size (px)

Citation preview

Page 1: Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

1© Life Cycle Institute© Life Cycle Institute

Hack Warz® Cyber AttackA Hands-On Lab for Network Defenders

Page 2: Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

2© Life Cycle Institute

Cybersecurity ensures information technology systems are available, reliable and secure

Cybersecurity is…

Software and hardware based

Technical and non-technical

Based on information from NSA, DoD, DISA

and DoN

Page 3: Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

3© Life Cycle Institute

Participants will learn how to:

Explain best practices using NIST Standards and the Risk Management Framework (RMF) six-step process

Use the RMF methodology to outline an approach for a defense-in-depth strategy

Execute “white hat” attacks against IT systems in the hands-on Hack Warz lab

Page 4: Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

4© Life Cycle Institute

Hack Warz® Cyber AttackA Hands-On Lab for Network Defenders

1-day workshop.7 Continuing education units (CEUs)

PublicOpen enrollment class schedule available at www.LCE.com/Institute

PrivateWorkshops may be tailored to your specific needs and delivered at your site.

Page 5: Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

5© Life Cycle Institute

Who Should Attend

Advanced IT Professionals responsible for cybersecurity, including people who administer, integrate and develop systems.

• IT Managers - CIO, DAA, CTO, CISO, ISSO, Head of Cybersecurity, Training Manager, Head of Innovation

• DoD Program Managers • Technical Managers • Technical Directors • Requirements Officers

Page 6: Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

6© Life Cycle Institute

CIA Triangle:Confidentiality, Integrity, Availability

Page 7: Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

7© Life Cycle Institute

Security Policies and Procedures

Why Create & Maintain an Information Security Policy?

Why Create & Maintain Standard Operating Procedures?

Why Create & Maintain Business Continuity and Disaster Recovery Procedures?

Page 8: Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

8© Life Cycle Institute

Risk Management Framework (RMF)

• Replaces DIACAP

• 6-step process – aligns to DIACAP phases

Categorize

Select

Implement

Assess

Authorize

Monitor

Page 9: Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

9© Life Cycle Institute

Hands-on Hack Warz Lab

Ethical hacking competition

Capture-the-flag event

Gain exposure to hacker tools and common exploits

Update defense-in-depth strategies using RMF methodology

Page 10: Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

10© Life Cycle Institute

Reasons to Choose the Life Cycle Institute

Extensive cybersecurity experience within DoD and commercial sector

We provide vulnerability scanning, penetration testing, risk analysis and

remediation services

Our engineers are qualified mentors for industry-leading security trainers

An active learning experience

Learning by doing vs. lecture

Group activities, assessments, case studies

Network with peers

Develop action plans to drive results post-training

Page 11: Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

11© Life Cycle Institute

[email protected]

www.LCE.com

800-556-9589

The Life Cycle Institute is the learning, leadership and change management practice at Life Cycle Engineering.