SlideShare uma empresa Scribd logo
1 de 11
1© Life Cycle Institute
Hack Warz® Cyber Attack
A Hands-On Lab for Network Defenders
2© Life Cycle Institute
Cybersecurity ensures information
technology systems are available, reliable and
secure
Cybersecurity is…
Software and
hardware based
Technical and
non-technical
Based on
information from
NSA, DoD, DISA
and DoN
3© Life Cycle Institute
Participants will learn how to:
Explain best practices using NIST Standards
and the Risk Management Framework (RMF)
six-step process
 Use the RMF methodology to outline an
approach for a defense-in-depth strategy
 Execute “white hat” attacks against IT
systems in the hands-on Hack Warz lab

4© Life Cycle Institute
Hack Warz® Cyber Attack
A Hands-On Lab for Network Defenders
1-day workshop
.7 Continuing education units (CEUs)
Private
Workshops may be tailored to your
specific needs and delivered at your
site.
5© Life Cycle Institute
Who Should Attend
Advanced IT Professionals responsible for cybersecurity,
including people who administer, integrate and develop
systems.
• IT Managers - CIO, DAA, CTO, CISO, ISSO, Head of
Cybersecurity, Training Manager, Head of Innovation
• DoD Program Managers
• Technical Managers
• Technical Directors
• Requirements Officers
6© Life Cycle Institute
CIA Triangle:
Confidentiality, Integrity, Availability
7© Life Cycle Institute
Security Policies and Procedures
Why Create & Maintain an
Information Security Policy?
Why Create & Maintain Standard
Operating Procedures?
Why Create & Maintain Business
Continuity and Disaster Recovery
Procedures?
8© Life Cycle Institute
Risk Management Framework (RMF)
• Replaces
DIACAP
• 6-step process
– aligns to
DIACAP phases
Categorize
Select
Implement
Assess
Authorize
Monitor
9© Life Cycle Institute
Hands-on Hack Warz Lab
Ethical hacking competition
Capture-the-flag event
Gain exposure to hacker tools and
common exploits
Update defense-in-depth strategies
using RMF methodology
10© Life Cycle Institute
Reasons to Choose the Life Cycle Institute
Extensive cybersecurity experience within DoD and commercial sector
We provide vulnerability scanning, penetration testing, risk analysis and
remediation services
Our engineers are qualified mentors for industry-leading security trainers
An active learning experience
Learning by doing vs. lecture
Group activities, assessments, case studies
Network with peers
Develop action plans to drive results post-training



11© Life Cycle Institute
Education@LCE.com
www.LCE.com
800-556-9589
The Life Cycle Institute is the learning, leadership and
change management practice at Life Cycle Engineering.

Mais conteúdo relacionado

Mais procurados

10 Commandments for Achieving Operational Excellence
10 Commandments for Achieving Operational Excellence10 Commandments for Achieving Operational Excellence
10 Commandments for Achieving Operational Excellence
Mitch Ackles
 

Mais procurados (20)

SMRP Body of Knowledge Guided Study Slide Share
SMRP Body of Knowledge Guided Study Slide ShareSMRP Body of Knowledge Guided Study Slide Share
SMRP Body of Knowledge Guided Study Slide Share
 
Leading high performance teams
Leading high performance teamsLeading high performance teams
Leading high performance teams
 
Leadership for Shutdowns, Turnarounds and Outages Workshop
Leadership for Shutdowns, Turnarounds and Outages WorkshopLeadership for Shutdowns, Turnarounds and Outages Workshop
Leadership for Shutdowns, Turnarounds and Outages Workshop
 
ISO 55000 for Leaders: Developing an Asset Management Policy
ISO 55000 for Leaders: Developing an Asset Management PolicyISO 55000 for Leaders: Developing an Asset Management Policy
ISO 55000 for Leaders: Developing an Asset Management Policy
 
Streamlined FMEA to Visual Dashboards: Building Transparency into Reliability...
Streamlined FMEA to Visual Dashboards: Building Transparency into Reliability...Streamlined FMEA to Visual Dashboards: Building Transparency into Reliability...
Streamlined FMEA to Visual Dashboards: Building Transparency into Reliability...
 
Critical Asset Performance Standards (CAPS) Development for Offshore Reliability
Critical Asset Performance Standards (CAPS) Development for Offshore ReliabilityCritical Asset Performance Standards (CAPS) Development for Offshore Reliability
Critical Asset Performance Standards (CAPS) Development for Offshore Reliability
 
Integrating Reliability into an Asset Integrity Dashboard
Integrating Reliability into an Asset Integrity DashboardIntegrating Reliability into an Asset Integrity Dashboard
Integrating Reliability into an Asset Integrity Dashboard
 
Workplace optimization services
Workplace optimization servicesWorkplace optimization services
Workplace optimization services
 
Cracking the Code - from security expert to exceptional leader
Cracking the Code - from security expert to exceptional leaderCracking the Code - from security expert to exceptional leader
Cracking the Code - from security expert to exceptional leader
 
CSP 2016
CSP 2016CSP 2016
CSP 2016
 
10 Commandments for Achieving Operational Excellence
10 Commandments for Achieving Operational Excellence10 Commandments for Achieving Operational Excellence
10 Commandments for Achieving Operational Excellence
 
Yaksas CSC - Vulnerability Assessment & Penetration Testing
Yaksas CSC - Vulnerability Assessment & Penetration Testing Yaksas CSC - Vulnerability Assessment & Penetration Testing
Yaksas CSC - Vulnerability Assessment & Penetration Testing
 
3 reasons why organizations will fail to manage iso 45001
3 reasons why organizations will fail to manage iso 450013 reasons why organizations will fail to manage iso 45001
3 reasons why organizations will fail to manage iso 45001
 
Real Estate Solutions Services
Real Estate Solutions ServicesReal Estate Solutions Services
Real Estate Solutions Services
 
Human Performance improvement for the Turkish Energy Sector
Human Performance improvement for the Turkish Energy SectorHuman Performance improvement for the Turkish Energy Sector
Human Performance improvement for the Turkish Energy Sector
 
Intégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsIntégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSs
 
OpenStack Training & Certifications
OpenStack Training & CertificationsOpenStack Training & Certifications
OpenStack Training & Certifications
 
Risk reporting infographic
Risk reporting infographicRisk reporting infographic
Risk reporting infographic
 
Cissp classroom program ievision
Cissp classroom program ievisionCissp classroom program ievision
Cissp classroom program ievision
 
Integrating Safety Management Systems into Your Organization
Integrating Safety Management Systems into Your OrganizationIntegrating Safety Management Systems into Your Organization
Integrating Safety Management Systems into Your Organization
 

Semelhante a Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
Tonex
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
Mark Simos
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 

Semelhante a Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders (20)

Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Certified SOC Analyst
Certified SOC AnalystCertified SOC Analyst
Certified SOC Analyst
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security Breakfast
 
edCeh brochure
edCeh brochureedCeh brochure
edCeh brochure
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 

Mais de Life Cycle Engineering

Mais de Life Cycle Engineering (11)

LCE Corporate Capabilities Brief-Life Cycle Talent
LCE Corporate Capabilities Brief-Life Cycle TalentLCE Corporate Capabilities Brief-Life Cycle Talent
LCE Corporate Capabilities Brief-Life Cycle Talent
 
Introduction to Reliability Excellence
Introduction to Reliability ExcellenceIntroduction to Reliability Excellence
Introduction to Reliability Excellence
 
Stakeholder Risk Management
Stakeholder Risk ManagementStakeholder Risk Management
Stakeholder Risk Management
 
10 Factors that May Affect the Future of Subsea Production
10 Factors that May Affect the Future of Subsea Production10 Factors that May Affect the Future of Subsea Production
10 Factors that May Affect the Future of Subsea Production
 
Competency Based Learning
Competency Based LearningCompetency Based Learning
Competency Based Learning
 
Reliability Engineering Certification Program
Reliability Engineering Certification ProgramReliability Engineering Certification Program
Reliability Engineering Certification Program
 
Connecting Reliability & Business + ISO 55000 Framework
Connecting Reliability & Business + ISO 55000 FrameworkConnecting Reliability & Business + ISO 55000 Framework
Connecting Reliability & Business + ISO 55000 Framework
 
ISO 55000 Overview
ISO 55000 OverviewISO 55000 Overview
ISO 55000 Overview
 
Introduction to Agile Software Development
Introduction to Agile Software DevelopmentIntroduction to Agile Software Development
Introduction to Agile Software Development
 
Lean Maintenance Training
Lean Maintenance Training Lean Maintenance Training
Lean Maintenance Training
 
Leading a Lean Implementation
Leading a Lean ImplementationLeading a Lean Implementation
Leading a Lean Implementation
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

  • 1. 1© Life Cycle Institute Hack Warz® Cyber Attack A Hands-On Lab for Network Defenders
  • 2. 2© Life Cycle Institute Cybersecurity ensures information technology systems are available, reliable and secure Cybersecurity is… Software and hardware based Technical and non-technical Based on information from NSA, DoD, DISA and DoN
  • 3. 3© Life Cycle Institute Participants will learn how to: Explain best practices using NIST Standards and the Risk Management Framework (RMF) six-step process  Use the RMF methodology to outline an approach for a defense-in-depth strategy  Execute “white hat” attacks against IT systems in the hands-on Hack Warz lab 
  • 4. 4© Life Cycle Institute Hack Warz® Cyber Attack A Hands-On Lab for Network Defenders 1-day workshop .7 Continuing education units (CEUs) Private Workshops may be tailored to your specific needs and delivered at your site.
  • 5. 5© Life Cycle Institute Who Should Attend Advanced IT Professionals responsible for cybersecurity, including people who administer, integrate and develop systems. • IT Managers - CIO, DAA, CTO, CISO, ISSO, Head of Cybersecurity, Training Manager, Head of Innovation • DoD Program Managers • Technical Managers • Technical Directors • Requirements Officers
  • 6. 6© Life Cycle Institute CIA Triangle: Confidentiality, Integrity, Availability
  • 7. 7© Life Cycle Institute Security Policies and Procedures Why Create & Maintain an Information Security Policy? Why Create & Maintain Standard Operating Procedures? Why Create & Maintain Business Continuity and Disaster Recovery Procedures?
  • 8. 8© Life Cycle Institute Risk Management Framework (RMF) • Replaces DIACAP • 6-step process – aligns to DIACAP phases Categorize Select Implement Assess Authorize Monitor
  • 9. 9© Life Cycle Institute Hands-on Hack Warz Lab Ethical hacking competition Capture-the-flag event Gain exposure to hacker tools and common exploits Update defense-in-depth strategies using RMF methodology
  • 10. 10© Life Cycle Institute Reasons to Choose the Life Cycle Institute Extensive cybersecurity experience within DoD and commercial sector We provide vulnerability scanning, penetration testing, risk analysis and remediation services Our engineers are qualified mentors for industry-leading security trainers An active learning experience Learning by doing vs. lecture Group activities, assessments, case studies Network with peers Develop action plans to drive results post-training   
  • 11. 11© Life Cycle Institute Education@LCE.com www.LCE.com 800-556-9589 The Life Cycle Institute is the learning, leadership and change management practice at Life Cycle Engineering.

Notas do Editor

  1. Identify Protect Detect Respond Recover