You’ve been hacked, or even only suspect you’ve been hacked. Now what?

Labs in this category guide you through approaches to addressing and managing the aftermath of an attack or security breach. You’ll get to experience actual attacks, within a controlled environment, so that the first time you see ransomware isn’t on your critical systems.

The labs in this category focus on the technical aspects of incident response, mitigation, and recovery, versus site-specific organizational policies or procedures.

 

Questions about which lab is right for you? Contact cyrin@atcorp.com.

What will you do when your organization is hit by ransomware? This exercise will show you what real ransomware, such as Petya or locky, looks like and how it operates. Make sure the first time you encounter ransomware is in the safe environment of a training exercise and not on a valuable workstation when under a tight deadline.

Prerequisites

Basic operating system security knowledge is assumed.

Expected Duration

3 hours, self-paced. Pause and continue at any time.

3 CPEs awarded on successful completion.

Cost

Coming very soon... check back in a few days!

This exercise exposes students to a live Distributed Denial of Service (DDoS) attack against a running web server. The particular attack is the network-level “SYN Flood”. Students learn how such an attack looks from the server side, as well as how to mitigate the attack temporarily and permanently.

Prerequisites
  • Familiarity with the Unix/Linux command line.
  • Basic web application knowledge (HTTP, URL parameters, etc.)
  • Basic networking concepts (TCP/IP, DNS, etc.)
Expected Duration

4 hours, self-paced. Pause and continue at any time.

4 CPEs awarded on successful completion.

Cost

Coming very soon... check back in a few days!