The participants learn how to hunt threat actors in different environments and learn how attackers conduct their campaigns and TTPs (Tactic, Techniques, Procedures). The scenarios are thoroughly reviewed during the exercise including the attacking methods, tools, and how defenders can find the traces of the attacks.
Attacker targets activities to whole company
Attacker targets activities to ICS/SCADA-systems
Attacker targets activities to management environment and core network
Total of 10-12 participants
Three work days
Let’s settle a confidential consultation.