Blue Team Penetration Testing Hands on Workshop


Blue Team Penetration Testing Hands On Workshop Certification Training Course Overview

 

Enroll for 5-day Blue Team Penetration Testing Hands On Workshop training course from Koenig Solutions. Blue Team Penetration Testing Hands On Workshop course is designed for consultants who have the task to protect the organization’s critical assets against any kind of threat.

Through a blend of hands-on labs and interactive lectures, you will be able to perform risk assessments by identifying threats against each asset and the weaknesses these threats can exploit. By evaluating the risks and prioritizing it, the blue team develops an action plan to implement controls that can lower the impact or likelihood of threats materializing against assets.

 

Target Audience:

  • Candidate working as Cybersecurity analyst
  • Candidate working as Cyber security specialist.
  • Candidate working as Cyber security engineer.
  • Candidate working as penetration tester.
  • Candidate working as Vulnerability tester.

 


Blue Team Penetration Testing Hands on Workshop (Duration : 40 Hours) Download Course Contents

Live Virtual Classroom (Instructor-Led)

Fee : 2,000 (Includes Taxes) 
9 AM - 5 PM (Flexible Time Slots for 4 hours option)




April
8 Hours/Day
19-23
19-30
May
8 Hours/Day
03-07
09-13
10-14
17-21
03-14
09-20
10-21
17-28
June
8 Hours/Day
07-11
13-17
14-18
21-25
07-18
13-24
14-25
21 Jun-02 Jul
July
8 Hours/Day
05-09
11-15
12-16
05-16
11-22
12-23

Classroom training is available in select Cities

Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Our Trainers! Click here

Request More Information

Course Prerequisites

When you’re on the blue team, you are familiar with and implement defensive tools known as detection systems. Blue team members need to be familiar with the following defensive tools:

  • Wireshark – lets you see what’s happening on your network at a microscopic level
  • Security information and event management (SIEM) tools – provide real-time analysis of security alerts generated by applications and network hardware

 

After completing this course, you will be able to:

  • Identify type of attacks
  • Identify intrusions on the systems
  • Identify and block the attacks before they succeed
  • Activate run books for incident response
  • Stay alert for reactive or preventive action
  • Train the physical security teams for identity spoof
  • Enhance security standards
  • Activate the containment of attacked systems
  • Logs and SIEM Config/Alerts
  • Security awareness training
  • Check on domain expirations
  • Email filters, threshold, and spam rules
  • Two-factor authentication
  • Deny long relay request
  • Application whitelisting
  • Manage keys securely