A cyberattack is right around the corner—does your team know what it will look like or how to respond? Test your team's abilities and your system's configuration!

This category includes capture-the-flag exercises, attack mitigation exercises, and red team / blue team exercise environments to pit your team members against each other. All scenarios include active monitoring so you know how far you've gotten!

A cyberattack is right around the corner—does your team know what it will look like or how to respond? Test your team's abilities and your system's configuration!

This package includes capture-the-flag exercises, attack mitigation exercises, and red team / blue team exercise environments to pit your team members against each other. All scenarios include active monitoring so you know how far you've gotten!

This package includes all exercises in the Attack and Defense category, as well as all new exercises in the category released during your subscription period.

Prerequisites

Prerequisites vary by lab, but are generally: familiarity with the UNIX command line and networking concepts, tools such as Metasploit and tcpdump, and knowledge of web application vulnerabilities (e.g., SQL injection).

Expected Duration

8.0 hours, self-paced. Pause and continue at any time.
8.0 CPEs awarded on successful completion.

Cost

$595 for 6 months of access.

Training Package