Attack & Defend Workshop

Attack & Defend Workshop

Through a combination of hands-on Pentester and SOC Analyst Prep training, we will ensure you become a well-rounded information security professional. #AttackNDefend.

If you are interested in establishing a foundation of skills for a successful information security career, then this workshop is for you!

This intermediate-level, five-day workshop encompasses the skills of both a Pentester and a SOC Analyst. Throughout the course, we will address and discuss various offensive topics, tools, technologies, and methodologies used in the industry. Also, participants will oversee a network that is currently under attack—using industry technologies such as Security Onion, Wireshark, Splunk, and Nessus. Students will learn numerous strategies to help defend against several attack scenarios. 

A Penetration Tester or Pentester develops and uses offensive skills and techniques to identify weaknesses for exploitation. Security Operations Center (SOC) Analysts identify compromised machines and malicious actors. These highly sought-after individuals utilize defensive security skills and techniques that are commonly used in the industry while working to mitigate any damages that may have occurred.

The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback, as well. 

Our team has worked hard to create a course that we think provides a unique learning experience that you won’t find anywhere else. This will be a challenging week that can jump-start your career in cybersecurity and give you an outstanding foundation for the future!

If you have any additional questions outside of the FAQs, please do not hesitate to reach out to [email protected] and we will be happy to assist you.

Course Outline

The course is tailored to the four primary exam objectives for the CompTIA CySA+ Certification which are:

  1. Threat Management
  2. Vulnerability Management
  3. Cyber Incident Response
  4. Security Architecture and Tool Sets 

Note: This is NOT an official CompTIA Training but preparation for real-world scenarios as a cybersecurity analyst and the CySA+ certification exam. Various tools, techniques, and procedures will be covered; thus those listed are just examples and are not limited to only those, as the material is subject to change.

Agenda – Day 1

  • Home Lab Setup
  • Passive Information Gathering (OSINT)
  • Common Services, Threats, & Attacks
  • Active Information Gathering
  • Vulnerability Identification & Analysis
  • Wireshark For Attackers & Defenders

Agenda – Day 2

  • Exploitation Techniques & Tools
  • Post Exploitation
  • Privilege Escalation Techniques
  • Buffer Overflows

Agenda – Day 3

  • IPv6 Overview & Attacks
  • IDS/IPS Tools
  • Threat Hunting w/ Security Onion
  • Snort Rule Management

Agenda – Day 4

  • Incident Handling & Response
  • Windows Forensics

Agenda – Day 5

  • Tools of the Trade
  • Attack & Defend Capture The Flag (CTF)
Upcoming Training