Mais conteúdo relacionado Semelhante a Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders (20) Mais de Life Cycle Engineering (11) Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders1. 1© Life Cycle Institute
Hack Warz® Cyber Attack
A Hands-On Lab for Network Defenders
2. 2© Life Cycle Institute
Cybersecurity ensures information
technology systems are available, reliable and
secure
Cybersecurity is…
Software and
hardware based
Technical and
non-technical
Based on
information from
NSA, DoD, DISA
and DoN
3. 3© Life Cycle Institute
Participants will learn how to:
Explain best practices using NIST Standards
and the Risk Management Framework (RMF)
six-step process
Use the RMF methodology to outline an
approach for a defense-in-depth strategy
Execute “white hat” attacks against IT
systems in the hands-on Hack Warz lab
4. 4© Life Cycle Institute
Hack Warz® Cyber Attack
A Hands-On Lab for Network Defenders
1-day workshop
.7 Continuing education units (CEUs)
Private
Workshops may be tailored to your
specific needs and delivered at your
site.
5. 5© Life Cycle Institute
Who Should Attend
Advanced IT Professionals responsible for cybersecurity,
including people who administer, integrate and develop
systems.
• IT Managers - CIO, DAA, CTO, CISO, ISSO, Head of
Cybersecurity, Training Manager, Head of Innovation
• DoD Program Managers
• Technical Managers
• Technical Directors
• Requirements Officers
6. 6© Life Cycle Institute
CIA Triangle:
Confidentiality, Integrity, Availability
7. 7© Life Cycle Institute
Security Policies and Procedures
Why Create & Maintain an
Information Security Policy?
Why Create & Maintain Standard
Operating Procedures?
Why Create & Maintain Business
Continuity and Disaster Recovery
Procedures?
8. 8© Life Cycle Institute
Risk Management Framework (RMF)
• Replaces
DIACAP
• 6-step process
– aligns to
DIACAP phases
Categorize
Select
Implement
Assess
Authorize
Monitor
9. 9© Life Cycle Institute
Hands-on Hack Warz Lab
Ethical hacking competition
Capture-the-flag event
Gain exposure to hacker tools and
common exploits
Update defense-in-depth strategies
using RMF methodology
10. 10© Life Cycle Institute
Reasons to Choose the Life Cycle Institute
Extensive cybersecurity experience within DoD and commercial sector
We provide vulnerability scanning, penetration testing, risk analysis and
remediation services
Our engineers are qualified mentors for industry-leading security trainers
An active learning experience
Learning by doing vs. lecture
Group activities, assessments, case studies
Network with peers
Develop action plans to drive results post-training
11. 11© Life Cycle Institute
Education@LCE.com
www.LCE.com
800-556-9589
The Life Cycle Institute is the learning, leadership and
change management practice at Life Cycle Engineering.
Notas do Editor Identify
Protect
Detect
Respond
Recover