Close

Red vs Blue

Red vs Blue 1
Red vs Blue Mile2 Cyber Security Certification

Mile2’s Ultimate Red vs Blue Team Course is built to provide intense hands-on sessions that emulates real-world cyber warfare and defense scenarios. You will implement principles and behaviors you have learned to combat malicious hackers that use advanced threat techniques.  

 

The intent is that the students will have 3 – 4 hours to interact with each section. In the Day 1 Morning scenario, you will access Proximo and Gracchus.  The Day 2 Afternoon work will be in Priscus and Verus.  Then, in the Day 2 Morning scenario you will access Maxiums and Quintas.  Finally, Day 2 Afternoon work will be in Tetraites and Cummodus.

 

In each segment of Red vs Blue you will have the first 30 minutes to organize your team. After this, you will have up to 3 hours and 30 minutes to attack the other machines and to place your team name in the flag.txt file. Once a team name is in the flag.txt file, it cannot be removed. The team that places their team name in as many flag.txt files as possible will be the winning team for that segment.

 

Key Course Information

Live Class Duration: 2 Days

Language: English

Class Formats:
*  Instructor-led

*  Live Virtual Training

Suggested Prior Knowledge:

* Networking
* Understanding Scanning and Vulnerabilities
* Network Technologies
* TCP/IP
* Microsoft Packages
* Basic Linux knowledge

CPEs:  24

Modules

  • Module 1 – Kali vs Proximo and Gracchus
  • Module 2 – Kali vs Priscus and Verus
  • Module 3 – Kali vs Maximus and Quintus
  • Module 4 – Kali vs Tetraites and Commodus

Tools & Applications

Participants in Red vs Blue will be using both open source and commercial tools in a controlled virtual cyber range. Some tools/applications that will be used are nmap, db-exploit, Metasploit through Kali Linux, Empire, and Microsoft PowerShell.

 

Who Should Attend

* Penetration Testers
* Microsoft Adminstrators
* Security Administrators
* Cybersecurity Engineers

Accreditations

Red vs Blue: Day One Format

MORNING

 

Required VMs:
• Kali-RvB
• Win10-RvB
• Proximo (Linux)
• Gracchus (Linux)

 

 

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.

 

AFTERNOON

 

Required VMs:

• Kali-RvB
• Win10-RvB
• Priscus (Windows 7)
• Verus (Windows XP)

 

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.

Red vs Blue: Day Two Format

MORNING

 

Required VMs:
• Kali-RvB
• Win10-RvB
• Paximus (Linux)
• Quintus (Linux)

 

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected. 

 

AFTERNOON

 

Required VMs:

• Kali-RvB
• Win10-RvB

• Tetraites (Windows 2K12)

• Commodus (Windows 10)

 

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.

Red vs Blue: End Goals

Graduates of mile2’s Red vs Blue Team scenario-based events will:

1. Become more versed with tools and applications, such as Metasploit, Kali Linux and Microsoft PowerShell.
2. Piece together a team that will focus on attack-based skill sets.
3. Assess existing penetration testing and incident response teams.
4. Prevent and defend against cyber-attacks.

error: Alert: Content is protected !!