Red Team vs Blue Team

Mile2’s Ultimate Red vs Blue Team Course is built to provide intense hands-on sessions that emulate real-world cyber warfare and defense scenarios. You will implement principles and behaviors you have learned to combat malicious hackers that use advanced threat techniques. The intent is that the students will have 3 - 4 hours to interact with each section. In the Day 1 Morning scenario, you will access Proximo and Gracchus. The Day 2 Afternoon work will be in Priscus and Verus. Then, in the Day 2 Morning scenario you will access Maxiums and Quintas. Finally, Day 2 Afternoon work will be in Tetraites and Cummodus.

Retail Price: $2,000.00

Next Date: Request Date

Course Days: 2


Request a Date

Request Custom Course


WHO SHOULD ATTEND?

  • Penetration Testers
  • Microsoft Administrators
  • Security Administrators
  • Anyone looking to learn more about security
  • Cyber Security Engineers

 

RED vs BLUE COURSE FORMAT

The Red vs. Blue Team is a scenario-based, hands-on lab experience. The goal is to put together items learned in Mile2’s cyber range based in both a Windows and Linux infrastructure. The four-day course consists of two days of hands-on labs using Kali Linux and Microsoft PowerShell and two days (four scenarios) ranging from intermediate to advanced problem sets.

 

TOOLS & APPLICATIONS

Participants in Red vs Blue will be using both open-source and commercial tools in a controlled virtual cyber range. Some tools/applications that will be used are nmap, db-exploit, Metasploit through Kali Linux, Empire, and Microsoft PowerShell.

 

ITEMS PROVIDED TO STUDENTS

  • Detailed Lab Manual
  • VMs for performing labs on your own
  • Access to mile2’s world-class cyber range
  • Credentials to both a Red and Blue Team

 

UPON COMPLETION

Graduates of mile2’s Red vs. Blue Team scenario-based events will

1. Become more versed with tools and applications, such as Metasploit, Kali Linux and Microsoft PowerShell.
2. Piece together a team that will focus on attack-based skill sets.
3. Assess existing penetration testing and incident response teams.
4. Prevent and defend against cyber-attacks.


OUTLINE
 
Day 1-Red vs Blue: Day One Format
 

MORNING

Required VMs:


• Kali-RvB
• Win10-RvB
• Proximo (Linux)
• Gracchus (Linux)

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.

AFTERNOON

Required VMs:

• Kali-RvB
• Win10-RvB
• Priscus (Windows 7)
• Verus (Windows XP)

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.

 
 
Day 2-Red vs Blue Day Two Format
 

MORNING

Required VMs:


• Kali-RvB
• Win10-RvB
• Paximus (Linux)
• Quintus (Linux)

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected. 

 

AFTERNOON

Required VMs:

• Kali-RvB
• Win10-RvB

• Tetraites (Windows 2K12)

• Commodus (Windows 10)

 

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.

 
RED TEAM MEMBER: Each Red Team member will be given three hours to attempt to exploit other students’ machines. The intent for the Red team is to gain access to other systems in the network and place their name or team name in the flag.txt file in the root/administrator directory.
 
BLUE TEAM MEMBER: Each BluEach Blue Team member will be given approximately 45 minutes to review the target systems within their scenario and potentially patch vulnerabilities. Members are authorized to change the default credentials for the user “playerone”, however, that password will be given to the mile2 range monitor.
 
 
***NOTE:
  • You cannot disable any services on the system, but you can patch them.
  • If credentials are changed after the start of the Red Team portion, there will be a timeout period up to 15 minutes.


Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com


Request a Date