Is your team prepared for the next supply chain attack or the next zero day? It's only a matter of time before your organization is compromised. You can protect your organization by becoming cyber resilient. Being cyber resilient allows organizations to identify, respond, and quickly recover from an IT security incident.
Cisco Security Engineering would like to invite you and your team to enroll in a free Cyber Security Operations training opportunity. No strings attached. This clinic is 90% hands on lab. So, no death by PowerPoint.
To better fit your teams' individual schedules, we offer very flexible training sessions from totally on your own to on demand personalized hands-on bootcamp style.
Gain first-hand knowledge on cyber attack and defense concepts, including ransomware, phishing, hacking tools, breach detection, incident response, and the latest defense technologies.
You will be given remote access to your own individual lab environment running in Cisco dCloud. So, there is nothing you need to install on your machine.
Scenarios are designed as modules that can stand alone or flow as part of the user experience you want to create to explore the world of cyber protection.
Module zero includes an overview from thought leaders on the threat landscape, what Talos is seeing, and where the security community needs to be.
Learn to navigate through our cyber-resilience platform, and then understand the environment from the perspective of an incident responder and an attacker.
Understand why, how, and what tools adversaries leverage to find loopholes in our networks and exploit vulnerabilities to obtain a foothold.
Understanding how reconnaissance works lets you launch an attack and exploit the threat environment to detect and prevent new attacks.
In this module, you'll learn how the adversary leverages social engineering, phishing, and fear tactics to infect a network with ransomware.
Access target network and use Metasploit to compromise systems. Detect and mitigate hostile behavior on your network using ISE and Cisco Secure Network Analytics.
Access a network through a compromised VPN node. Detect and remove the compromised host from your network using ISE and a next-generation firewall.
This threat-hunting scenario uses two market leaders for security information and event management (SIEM): Splunk and IBM QRadar.
Learn how a SOAR can automate threat response tasks by integrating solutions like Cisco Firepower, Cisco ISE, and VirusTotal.
Attack web applications with XSS and SQL injection attacks, and then defend against them using Radware AppWall.
Hit HackMD's web services with a denial of service (DoS) attack. Pivot to defense with Radware DefensePro DDoS.
Launch phishing and social engineering attacks to gain access, and then use Duo and Splunk to defend yourself.
Monitor HackMD's data center for potential threats using Cisco Secure Workload.
Develop a phishing campaign and launch a targeted exploitation against HackMD. Use Cisco Secure Email to fight advanced phishing tools like Empire and Zphisher.
Deliver dropper and RAT to gain internal access and kill target. Then use AMP, Cisco Secure Network Analytics, Firepower, and Umbrella to identify and remediate the attack.
Perform a digital forensics and incident response (DFIR) investigation to understand compromise.
To help understand why cyber attacks occur and demonstrate common attack scenarios, Cisco created a series of comic books. The technology and security concepts in these comics are real, and most are covered in Cyber Defense Clinic labs.