Training Mile2

Training goals

code: M2-RTBT | version: v1

The Red Team vs Blue Team is a scenario-based, hands-on lab experience. The goal is to put together items learned during Mile2 courses and apply them in this environment. It consists of two days (four scenarios) ranging from easy to intermediate to advanced problem sets.

As a Blue team individual, you will be given approximately 45 minutes to review the target systems within your scenario and potentially patch vulnerabilities. ***NOTE: You cannot disable any services on the system, but you can patch it***. You are authorized to change the default credentials for the user “playerone”, however, that password will be given to the mile2 range monitor. ***NOTE: If credentials are changed after the start of the Red Team portion, there will be a timeout period of up to 15 minutes***.

As a Red team individual, you will be given three hours to attempt to exploit other students’ machines. The intent for the Red team is to gain access to other systems in the network and place their name or team name in the flag.txt file in the root/administrator directory.

Upon Completion:

  • Graduates of the Mile2 Red Team vs Blue Team scenario-based events allow for individuals to piece together a team that will attack based on skillset. This allows managers to assess their current penetration testing and incident response teams to ensure they are able to attack vulnerabilities and defend against attacks.

Who Should Attend:

  • Pen Testers
  • Ethical Hackers
  • Network Auditors
  • Cyber Security professionals
  • Vulnerability Assessors
  • Cyber Security Managers
  • IS Managers

Accreditations & Acknowledgements

Mile2® is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Conspect Show list

  1. Red Team vs Blue Team Scenarios
  2. Scenario 1 – Kali vs. Proximo and Gracchus
  3. Scenario 2 – Kali vs. Priscus and Verus
  4. Scenario 3 – Kali vs. Maximus and Quintus
  5. Scenario 4 – Kali vs. Tetraites and Commodus
Download conspect training as PDF

Additional information

Prerequisites
  • A minimum of 12 months’ experience in networking technologies
  • Sound knowledge of TCP/IP
  • Knowledge of Microsoft packages
  • Basic Knowledge of Linux is essential
Difficulty level
Duration 2 days
Certificate

The participants will obtain certificates signed by Mile2 (course completion).

Trainer

Certified Mile2 Instructor.

Mile2 show more courses
Training thematically related

Security

Contact form

Please fill form below to obtain more info about this training.







* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

TRAINING PRICE FROM 1300 EUR

  • In order to propose a date for this training, please contact the Sales Department

Upcoming Mile2 training

Training schedule Mile2