Finding out the root causes of a security incident takes a lot of effort. At times when insufficient tracks and tools are available, blue team might even wish they could just resort to a fortune teller. In this course, for the audience to have a glimpse of real-world security practices, major CVEs in recent years will be presented. Participants will be instructed in using the tools commonly used by the blue team through highly realistic security incident scenarios and tools, including log analysis, network traffic investigation, etc. Event root cause analysis and track reconstruction will also be covered. And at the end of this course, you will be able to write a simple investigation report.
1. Common blue team tools
2. Common hacking techniques
3. Traffic analysis skills
4. Hands-on lab (security incident investigation)
1. Laptop memory:4GB(or more) RAM
2. OS: Windows 10 or higher
3. Browser: Chrome or Firefox
4. Able to connect to Wi-Fi
5. Notepad++ installation is recommended.
With IT-related work experience and a little understanding of blue team mindset & techniques.
20
CYBERSEC 2023 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy .