Loading…
Friday, June 5 • 8:00am - 5:00pm
Training Session C: Build Your Own Pentesting Environment

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

In this one day course attendees will learn the process and steps to create their own layered network architecture and build their own range that can be used for practicing defensive techniques, offensive skills or even to build a Capture The Flag (CTF) environment. This process has been used to create CTFs for DEFCON, Hacker Halted and Showmecon; furthermore, the course is an introduction to the process in the instructor’s book Building Virtual Pentesting Labs for Advanced Penetration Testing (https://www.packtpub.com/networking-and-servers/building-virtual-pentesting-labs-advanced-penetration-testing).

Attendees will earn 8 CPEs by participating in this day-long Training, which will be divided into three Sessions:

Session ONE – Proven Defense Measures
  •           Success Stories
  •           Modern filtering
  •           Network segmentation and isolation
  •           Internal honeypots, sinkholes and blackholes
  •           LAB – Modern Filtering
    •     Ingress
    •     Egress
    •     Deploying time based access control
    •     Blackhole routing
Session TWO – Creating an External Attack Architecture
  •           Establishing the layers
  •           Configuring the perimeter devices
    •     Router
    •     Firewalls
  •           Deploying Monitors
    •     Intrusion Detection System (IDS)
    •     Intrusion Prevention System (IPS)
    •     Load balancers
    •     Integrating web application firewalls
  •           LAB – External Architecture
Session THREE – Building a Complete Cyber Range and a Capture the Flag (CTF) architecture
  •           Creating the layered architecture
    •     Segmenting the architecture
  •           The multi-tiered CTF labyrinth
  •           Integrating the decoys
    •     Honeypots
    •     Honeynets
    •     Darknets
  •           Attacking the completed range
  •           Defending the completed range
  •           LAB: Attackers and Defenders challenge scenario

Speakers
avatar for Kevin Cardwell

Kevin Cardwell

Lead Consultant, CESI (Cardwell Engineering Solutions International)
Kevin Cardwell served as the leader of a 5 person DoD Red Team that achieved a 100% success rate at compromising systems and networks for six straight years. He has conducted over 500 security assessments across the globe. His expertise is in finding weaknesses and determining ways... Read More →


Friday June 5, 2015 8:00am - 5:00pm PDT
406B

Attendees (0)