Cyber Defense Clinic - Cincinnati
In the real world, it’s no longer a matter of if an attacker will get in, but when and for how long. Are you prepared?
Join Cisco to experience common cyber security attack situations in a lab environment, where you will get to play both the role of attacker and defender. The Cisco Cyber Defense Clinic has been built as a training platform based on the Cisco Security Integrated Threat Defense (ITD) architecture and solutions. Utilizing an environment that models after many enterprise networks, students will learn and understand how their own environments get compromised, how security breaches get detected, and how to respond with maximum effectiveness.
Light Breakfast and Lunch will be provided
Security and Network professionals need to evolve their strategy from a point-in-time approach to pervasive protection across the full attack continuum. Join Cisco to experience common cyber security attack situations in a virtualized lab environment, where you will get to play both the role of attacker and defender. Utilizing an environment that models many enterprise networks, you will learn how environments get compromised, how breaches get discovered, and how to respond most effectively with Cisco Security products and integrated solution architectures. Audience: This course is designed for engineers, analysts, and managers of security operations and network infrastructure.
Please bring your laptop to participate in the hands-on labs. Note: Your laptop is for access only and will not be at risk of infection.
Scenario 1: HackMDs.com - Connectivity and Setup
Scenario 2: Target Reconnaissance: Gathering Information about Vulnerabilities for a Future Attack
Scenario 3: Smash and Grab: Attacking Your Public Network Services Through the Front Door (Mitigation with NGFW & IPS)
Scenario 4: The Ransomware Scenario (Mitigation using AMP, NGFW, & Threat Grid)
Scenario 5: Insider Threats: Moving Within to Obtain and Export Your Data (Mitigation with StealthWatch & ISE)
Scenario 6: Compromised Hosts: Controlling Access and Monitoring for Malicious Threats (Mitigation with Rapid Threat Containment using NGFW & ISE)
Scenario 7: Centralized Defense (Splunk or QRadar SIEM integration)
Scenario 8: Cyber Threat Response Challenge
8:45 – 9:00 Check in, Breakfast, Wifi setup, Networking
9:00 – 9:30 Introduction to Cyber Defense Clinic Labs
9:30 – 11:45 Hands on Labs
11:45 – 12:15 Lunch
12:15 – 3:30 Continue Hands on Labs