0% found this document useful (0 votes)
162 views11 pages

Blue Team Fundamentals

CW Labs is a UK-based Ed-tech company specializing in cybersecurity training through cyber range labs and up-skilling platforms. Their Blue Team Fundamentals course focuses on enhancing investigation skills for cyber defenders, covering topics such as cyber defense, threat analysis, incident response, and digital forensics. Participants will gain hands-on experience in identifying and mitigating cyber threats, with prerequisites including networking knowledge and familiarity with SIEM.

Uploaded by

comedordecasadas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
162 views11 pages

Blue Team Fundamentals

CW Labs is a UK-based Ed-tech company specializing in cybersecurity training through cyber range labs and up-skilling platforms. Their Blue Team Fundamentals course focuses on enhancing investigation skills for cyber defenders, covering topics such as cyber defense, threat analysis, incident response, and digital forensics. Participants will gain hands-on experience in identifying and mitigating cyber threats, with prerequisites including networking knowledge and familiarity with SIEM.

Uploaded by

comedordecasadas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CYBERWARFARE LABS

Blue Team
Fundamentals
About CW Labs :
CW Labs is a renowned UK based Ed-tech company specializing in

cybersecurity cyber range labs. They provide on-demand educational

services and recognize the need for continuous adaptation to evolving

threats and client requirements. The company has two primary divisions:

• Cyber Range Labs


• Up-Skilling Platform
I. INTRODUCTION
• Introduction to Cyber Defense
• Importance of Cyber Defense
• Red X Blue X Purple Teaming
• Roles & Responsibilities of Cyber Defense
• Cyber Security framework

II. INTRODUCTION TO CYBER OPERATIONS

• General overview of SOC • Tool & Technology


• Working behavior of SOC • Incident Management & handling
• Dedicated vs Virtual SOC • First line of investigation
III. FOUNDATIONS OF CYBER THREAT ANALYSIS AND INTELLIGENCE

• General overview of CTI • IOC Vs IOA


• Cyber Threat Landscape • Pain Of Pyramid
• Common sources of CTI
• Introduction to Threat Intel Portal | TIP

IV. PROACTIVE CYBER THREAT HUNTING

• General overview of CTH


• Roles & Working of CTH
• Proactive & Reactive approach
• Foundational overview about MITRE ATT&CK framework
• Cyber Kill Chain
V. INCIDENT RESPONSE STRATEGIES AND TECHNIQUES
• General overview of IR
• Key component of IR
VII. Lab Exercise
• Working of IR
• IR Lifecycle • Lab Set-up
• Web based attack investigation
VI. UNVEILING THE SECRETS OF DIGITAL
• Network based attack investigation
INVESTIGATIONS • Memory Forensics
• General overview of digital forensics
• Post incident analysis
• Working of digital forensics
• Evidence collection methodology
Lab Highlights

We the team CWL has been specifically designed the


Blue Team Fundamentals to Enhance the real time
investigation skills for the cyber defenders to adapt to
the evolving threat landscape and effectively
safeguard organizations against cyber attacks.
Lab Highlights
• Hands-on investigations on various Sophisticated Cyber Threats
• Enhance your skills in identifying, assessing, and mitigating Cyber threats in systems and
applications.
• Develop your Investigative skills by monitoring security alerts, analyzing logs, and identifying
suspicious activities.
• Enhance your skill set in Endpoint security, Network based anomaly detection, security alert
investigations and much more
• Skills in digital forensics to investigate and analyze security incidents and memory forensics
Lab instruction
• The objective of this course is to provide participants with
a simulated real world enterprise infrastructure, where
participants can engage in various investigation and
defensive operations.

• The lab deployment instruction will contains a well


documented PDF for local installation and configuration,

• Participants will be guided through step-by-step


procedure in both identification and detection operation
Outcomes
The general outcomes of effective Blue Team Fundamentals
are listed below

1. Good understanding about cyber defences


2. working of various roles and responsibilities
3. First line of investigation
4. SIEM Based investigation
5. Post Compromise Analysis
Prerequisite
General prerequisite of Blue Team Fundamentals are listed below.
1. Good understanding of Networking.
2. Basic understanding of SIEM
3. Familiarity with Command line basics
Thank You
For Professional Red Team / Blue Team / Purple Team / Cloud Cyber Range labs / Trainings, please contact

[email protected]
To know more about our offerings, please visit: https://cyberwarfare.live

You might also like