Close

Red vs Blue

Red vs Blue 1
Red vs Blue Mile2 Cyber Security Certification

Mile2’s Ultimate Red vs Blue Team Course is built to provide intense hands-on sessions that emulates real-world cyber warfare and defense scenarios. You will implement principles and behaviors you have learned to combat malicious hackers that use advanced threat techniques.  

 

The intent is that the students will have 3 – 4 hours to interact with each section. In the Day 1 Morning scenario, you will access Proximo and Gracchus.  The Day 2 Afternoon work will be in Priscus and Verus.  Then, in the Day 2 Morning scenario you will access Maxiums and Quintas.  Finally, Day 2 Afternoon work will be in Tetraites and Cummodus.

 

In each segment of Red vs Blue you will have the first 30 minutes to organize your team. After this, you will have up to 3 hours and 30 minutes to attack the other machines and to place your team name in the flag.txt file. Once a team name is in the flag.txt file, it cannot be removed. The team that places their team name in as many flag.txt files as possible will be the winning team for that segment.

 

Key Course Information

Live Class Duration: 2 Days

Language: English

Class Formats:
*  Instructor-led

*  Live Virtual Training

Suggested Prior Knowledge:

* Networking
* Understanding Scanning and Vulnerabilities
* Network Technologies
* TCP/IP
* Microsoft Packages
* Basic Linux knowledge

CPEs:  24

Modules

  • Module 1 – Kali vs Proximo and Gracchus
  • Module 2 – Kali vs Priscus and Verus
  • Module 3 – Kali vs Maximus and Quintus
  • Module 4 – Kali vs Tetraites and Commodus

Tools & Applications

Participants in Red vs Blue will be using both open source and commercial tools in a controlled virtual cyber range. Some tools/applications that will be used are nmap, db-exploit, Metasploit through Kali Linux, Empire, and Microsoft PowerShell.

 

Who Should Attend

* Penetration Testers
* Microsoft Adminstrators
* Security Administrators
* Cybersecurity Engineers

Accreditations

Red vs Blue: Day One Format

MORNING

 

Required VMs:
• Kali-RvB
• Win10-RvB
• Proximo (Linux)
• Gracchus (Linux)

 

 

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.

 

AFTERNOON

 

Required VMs:

• Kali-RvB
• Win10-RvB
• Priscus (Windows 7)
• Verus (Windows XP)

 

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.

Red vs Blue: Day Two Format

MORNING

 

Required VMs:
• Kali-RvB
• Win10-RvB
• Paximus (Linux)
• Quintus (Linux)

 

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected. 

 

AFTERNOON

 

Required VMs:

• Kali-RvB
• Win10-RvB

• Tetraites (Windows 2K12)

• Commodus (Windows 10)

 

Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.

Red vs Blue: End Goals

Graduates of mile2’s Red vs Blue Team scenario-based events will:

1. Become more versed with tools and applications, such as Metasploit, Kali Linux and Microsoft PowerShell.
2. Piece together a team that will focus on attack-based skill sets.
3. Assess existing penetration testing and incident response teams.
4. Prevent and defend against cyber-attacks.

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission