Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders


Published on

This one-day workshop combines the Hack Warz ethical hacking competition with the Risk Management Framework six-step Security Life Cycle to demonstrate how to think like a hacker when designing a systems hardening plan.

Published in: Education
  • Login to see the comments

  • Be the first to like this

Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

  1. 1. 1© Life Cycle Institute Hack Warz® Cyber Attack A Hands-On Lab for Network Defenders
  2. 2. 2© Life Cycle Institute Cybersecurity ensures information technology systems are available, reliable and secure Cybersecurity is… Software and hardware based Technical and non-technical Based on information from NSA, DoD, DISA and DoN
  3. 3. 3© Life Cycle Institute Participants will learn how to: Explain best practices using NIST Standards and the Risk Management Framework (RMF) six-step process  Use the RMF methodology to outline an approach for a defense-in-depth strategy  Execute “white hat” attacks against IT systems in the hands-on Hack Warz lab 
  4. 4. 4© Life Cycle Institute Hack Warz® Cyber Attack A Hands-On Lab for Network Defenders 1-day workshop .7 Continuing education units (CEUs) Private Workshops may be tailored to your specific needs and delivered at your site.
  5. 5. 5© Life Cycle Institute Who Should Attend Advanced IT Professionals responsible for cybersecurity, including people who administer, integrate and develop systems. • IT Managers - CIO, DAA, CTO, CISO, ISSO, Head of Cybersecurity, Training Manager, Head of Innovation • DoD Program Managers • Technical Managers • Technical Directors • Requirements Officers
  6. 6. 6© Life Cycle Institute CIA Triangle: Confidentiality, Integrity, Availability
  7. 7. 7© Life Cycle Institute Security Policies and Procedures Why Create & Maintain an Information Security Policy? Why Create & Maintain Standard Operating Procedures? Why Create & Maintain Business Continuity and Disaster Recovery Procedures?
  8. 8. 8© Life Cycle Institute Risk Management Framework (RMF) • Replaces DIACAP • 6-step process – aligns to DIACAP phases Categorize Select Implement Assess Authorize Monitor
  9. 9. 9© Life Cycle Institute Hands-on Hack Warz Lab Ethical hacking competition Capture-the-flag event Gain exposure to hacker tools and common exploits Update defense-in-depth strategies using RMF methodology
  10. 10. 10© Life Cycle Institute Reasons to Choose the Life Cycle Institute Extensive cybersecurity experience within DoD and commercial sector We provide vulnerability scanning, penetration testing, risk analysis and remediation services Our engineers are qualified mentors for industry-leading security trainers An active learning experience Learning by doing vs. lecture Group activities, assessments, case studies Network with peers Develop action plans to drive results post-training   
  11. 11. 11© Life Cycle Institute 800-556-9589 The Life Cycle Institute is the learning, leadership and change management practice at Life Cycle Engineering.