In this one day course attendees will learn the process and steps to create their own layered network architecture and build their own range that can be used for practicing defensive techniques, offensive skills or even to build a Capture The Flag (CTF) environment. This process has been used to create CTFs for DEFCON, Hacker Halted and Showmecon; furthermore, the course is an introduction to the process in the instructor’s book Building Virtual Pentesting Labs for Advanced Penetration Testing (https://www.packtpub.com/networking-and-servers/building-virtual-pentesting-labs-advanced-penetration-testing).
Attendees will earn 8 CPEs by participating in this day-long Training, which will be divided into three Sessions:
Session ONE – Proven Defense Measures
- Success Stories
- Modern filtering
- Network segmentation and isolation
- Internal honeypots, sinkholes and blackholes
- LAB – Modern Filtering
- Ingress
- Egress
- Deploying time based access control
- Blackhole routing
Session TWO – Creating an External Attack Architecture
- Establishing the layers
- Configuring the perimeter devices
- Deploying Monitors
- Intrusion Detection System (IDS)
- Intrusion Prevention System (IPS)
- Load balancers
- Integrating web application firewalls
- LAB – External Architecture
Session THREE – Building a Complete Cyber Range and a Capture the Flag (CTF) architecture
- Creating the layered architecture
- Segmenting the architecture
- The multi-tiered CTF labyrinth
- Integrating the decoys
- Honeypots
- Honeynets
- Darknets
- Attacking the completed range
- Defending the completed range
- LAB: Attackers and Defenders challenge scenario