SlideShare a Scribd company logo
1 of 11
1© Life Cycle Institute
Hack Warz® Cyber Attack
A Hands-On Lab for Network Defenders
2© Life Cycle Institute
Cybersecurity ensures information
technology systems are available, reliable and
secure
Cybersecurity is…
Software and
hardware based
Technical and
non-technical
Based on
information from
NSA, DoD, DISA
and DoN
3© Life Cycle Institute
Participants will learn how to:
Explain best practices using NIST Standards
and the Risk Management Framework (RMF)
six-step process
 Use the RMF methodology to outline an
approach for a defense-in-depth strategy
 Execute “white hat” attacks against IT
systems in the hands-on Hack Warz lab

4© Life Cycle Institute
Hack Warz® Cyber Attack
A Hands-On Lab for Network Defenders
1-day workshop
.7 Continuing education units (CEUs)
Private
Workshops may be tailored to your
specific needs and delivered at your
site.
5© Life Cycle Institute
Who Should Attend
Advanced IT Professionals responsible for cybersecurity,
including people who administer, integrate and develop
systems.
• IT Managers - CIO, DAA, CTO, CISO, ISSO, Head of
Cybersecurity, Training Manager, Head of Innovation
• DoD Program Managers
• Technical Managers
• Technical Directors
• Requirements Officers
6© Life Cycle Institute
CIA Triangle:
Confidentiality, Integrity, Availability
7© Life Cycle Institute
Security Policies and Procedures
Why Create & Maintain an
Information Security Policy?
Why Create & Maintain Standard
Operating Procedures?
Why Create & Maintain Business
Continuity and Disaster Recovery
Procedures?
8© Life Cycle Institute
Risk Management Framework (RMF)
• Replaces
DIACAP
• 6-step process
– aligns to
DIACAP phases
Categorize
Select
Implement
Assess
Authorize
Monitor
9© Life Cycle Institute
Hands-on Hack Warz Lab
Ethical hacking competition
Capture-the-flag event
Gain exposure to hacker tools and
common exploits
Update defense-in-depth strategies
using RMF methodology
10© Life Cycle Institute
Reasons to Choose the Life Cycle Institute
Extensive cybersecurity experience within DoD and commercial sector
We provide vulnerability scanning, penetration testing, risk analysis and
remediation services
Our engineers are qualified mentors for industry-leading security trainers
An active learning experience
Learning by doing vs. lecture
Group activities, assessments, case studies
Network with peers
Develop action plans to drive results post-training



11© Life Cycle Institute
Education@LCE.com
www.LCE.com
800-556-9589
The Life Cycle Institute is the learning, leadership and
change management practice at Life Cycle Engineering.

More Related Content

What's hot

SMRP Body of Knowledge Guided Study Slide Share
SMRP Body of Knowledge Guided Study Slide ShareSMRP Body of Knowledge Guided Study Slide Share
SMRP Body of Knowledge Guided Study Slide ShareLife Cycle Engineering
 
Leadership for Shutdowns, Turnarounds and Outages Workshop
Leadership for Shutdowns, Turnarounds and Outages WorkshopLeadership for Shutdowns, Turnarounds and Outages Workshop
Leadership for Shutdowns, Turnarounds and Outages WorkshopLife Cycle Engineering
 
ISO 55000 for Leaders: Developing an Asset Management Policy
ISO 55000 for Leaders: Developing an Asset Management PolicyISO 55000 for Leaders: Developing an Asset Management Policy
ISO 55000 for Leaders: Developing an Asset Management PolicyLife Cycle Engineering
 
Workplace optimization services
Workplace optimization servicesWorkplace optimization services
Workplace optimization servicesAdvisian
 
Cracking the Code - from security expert to exceptional leader
Cracking the Code - from security expert to exceptional leaderCracking the Code - from security expert to exceptional leader
Cracking the Code - from security expert to exceptional leaderSecurity Catalyst
 
10 Commandments for Achieving Operational Excellence
10 Commandments for Achieving Operational Excellence10 Commandments for Achieving Operational Excellence
10 Commandments for Achieving Operational ExcellenceMitch Ackles
 
Yaksas CSC - Vulnerability Assessment & Penetration Testing
Yaksas CSC - Vulnerability Assessment & Penetration Testing Yaksas CSC - Vulnerability Assessment & Penetration Testing
Yaksas CSC - Vulnerability Assessment & Penetration Testing Uday Mittal
 
3 reasons why organizations will fail to manage iso 45001
3 reasons why organizations will fail to manage iso 450013 reasons why organizations will fail to manage iso 45001
3 reasons why organizations will fail to manage iso 45001Chris J Ward CMIOSH
 
Real Estate Solutions Services
Real Estate Solutions ServicesReal Estate Solutions Services
Real Estate Solutions ServicesManeer
 
Human Performance improvement for the Turkish Energy Sector
Human Performance improvement for the Turkish Energy SectorHuman Performance improvement for the Turkish Energy Sector
Human Performance improvement for the Turkish Energy SectorGSE Systems, Inc.
 
Intégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsIntégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsPECB
 
OpenStack Training & Certifications
OpenStack Training & CertificationsOpenStack Training & Certifications
OpenStack Training & CertificationsOpenStack
 
Risk reporting infographic
Risk reporting infographicRisk reporting infographic
Risk reporting infographicWorkiva
 
Integrating Safety Management Systems into Your Organization
Integrating Safety Management Systems into Your OrganizationIntegrating Safety Management Systems into Your Organization
Integrating Safety Management Systems into Your Organizationjamelleblanco360training
 

What's hot (20)

SMRP Body of Knowledge Guided Study Slide Share
SMRP Body of Knowledge Guided Study Slide ShareSMRP Body of Knowledge Guided Study Slide Share
SMRP Body of Knowledge Guided Study Slide Share
 
Leading high performance teams
Leading high performance teamsLeading high performance teams
Leading high performance teams
 
Leadership for Shutdowns, Turnarounds and Outages Workshop
Leadership for Shutdowns, Turnarounds and Outages WorkshopLeadership for Shutdowns, Turnarounds and Outages Workshop
Leadership for Shutdowns, Turnarounds and Outages Workshop
 
ISO 55000 for Leaders: Developing an Asset Management Policy
ISO 55000 for Leaders: Developing an Asset Management PolicyISO 55000 for Leaders: Developing an Asset Management Policy
ISO 55000 for Leaders: Developing an Asset Management Policy
 
Streamlined FMEA to Visual Dashboards: Building Transparency into Reliability...
Streamlined FMEA to Visual Dashboards: Building Transparency into Reliability...Streamlined FMEA to Visual Dashboards: Building Transparency into Reliability...
Streamlined FMEA to Visual Dashboards: Building Transparency into Reliability...
 
Critical Asset Performance Standards (CAPS) Development for Offshore Reliability
Critical Asset Performance Standards (CAPS) Development for Offshore ReliabilityCritical Asset Performance Standards (CAPS) Development for Offshore Reliability
Critical Asset Performance Standards (CAPS) Development for Offshore Reliability
 
Integrating Reliability into an Asset Integrity Dashboard
Integrating Reliability into an Asset Integrity DashboardIntegrating Reliability into an Asset Integrity Dashboard
Integrating Reliability into an Asset Integrity Dashboard
 
Workplace optimization services
Workplace optimization servicesWorkplace optimization services
Workplace optimization services
 
Cracking the Code - from security expert to exceptional leader
Cracking the Code - from security expert to exceptional leaderCracking the Code - from security expert to exceptional leader
Cracking the Code - from security expert to exceptional leader
 
CSP 2016
CSP 2016CSP 2016
CSP 2016
 
10 Commandments for Achieving Operational Excellence
10 Commandments for Achieving Operational Excellence10 Commandments for Achieving Operational Excellence
10 Commandments for Achieving Operational Excellence
 
Yaksas CSC - Vulnerability Assessment & Penetration Testing
Yaksas CSC - Vulnerability Assessment & Penetration Testing Yaksas CSC - Vulnerability Assessment & Penetration Testing
Yaksas CSC - Vulnerability Assessment & Penetration Testing
 
3 reasons why organizations will fail to manage iso 45001
3 reasons why organizations will fail to manage iso 450013 reasons why organizations will fail to manage iso 45001
3 reasons why organizations will fail to manage iso 45001
 
Real Estate Solutions Services
Real Estate Solutions ServicesReal Estate Solutions Services
Real Estate Solutions Services
 
Human Performance improvement for the Turkish Energy Sector
Human Performance improvement for the Turkish Energy SectorHuman Performance improvement for the Turkish Energy Sector
Human Performance improvement for the Turkish Energy Sector
 
Intégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsIntégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSs
 
OpenStack Training & Certifications
OpenStack Training & CertificationsOpenStack Training & Certifications
OpenStack Training & Certifications
 
Risk reporting infographic
Risk reporting infographicRisk reporting infographic
Risk reporting infographic
 
Cissp classroom program ievision
Cissp classroom program ievisionCissp classroom program ievision
Cissp classroom program ievision
 
Integrating Safety Management Systems into Your Organization
Integrating Safety Management Systems into Your OrganizationIntegrating Safety Management Systems into Your Organization
Integrating Safety Management Systems into Your Organization
 

Similar to Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systemsTonex
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)Qualitest
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxMark Simos
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceTej Luthra
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalrkadayam
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Dilum Bandara
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationKoenig Solutions Ltd.
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Tripwire
 
Certified SOC Analyst
Certified SOC AnalystCertified SOC Analyst
Certified SOC AnalystSagarNegi10
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information securityAnant Shrivastava
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.accenture
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security BreakfastRackspace
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.accenture
 

Similar to Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders (20)

Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Certified SOC Analyst
Certified SOC AnalystCertified SOC Analyst
Certified SOC Analyst
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security Breakfast
 
edCeh brochure
edCeh brochureedCeh brochure
edCeh brochure
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 

More from Life Cycle Engineering

More from Life Cycle Engineering (11)

LCE Corporate Capabilities Brief-Life Cycle Talent
LCE Corporate Capabilities Brief-Life Cycle TalentLCE Corporate Capabilities Brief-Life Cycle Talent
LCE Corporate Capabilities Brief-Life Cycle Talent
 
Introduction to Reliability Excellence
Introduction to Reliability ExcellenceIntroduction to Reliability Excellence
Introduction to Reliability Excellence
 
Stakeholder Risk Management
Stakeholder Risk ManagementStakeholder Risk Management
Stakeholder Risk Management
 
10 Factors that May Affect the Future of Subsea Production
10 Factors that May Affect the Future of Subsea Production10 Factors that May Affect the Future of Subsea Production
10 Factors that May Affect the Future of Subsea Production
 
Competency Based Learning
Competency Based LearningCompetency Based Learning
Competency Based Learning
 
Reliability Engineering Certification Program
Reliability Engineering Certification ProgramReliability Engineering Certification Program
Reliability Engineering Certification Program
 
Connecting Reliability & Business + ISO 55000 Framework
Connecting Reliability & Business + ISO 55000 FrameworkConnecting Reliability & Business + ISO 55000 Framework
Connecting Reliability & Business + ISO 55000 Framework
 
ISO 55000 Overview
ISO 55000 OverviewISO 55000 Overview
ISO 55000 Overview
 
Introduction to Agile Software Development
Introduction to Agile Software DevelopmentIntroduction to Agile Software Development
Introduction to Agile Software Development
 
Lean Maintenance Training
Lean Maintenance Training Lean Maintenance Training
Lean Maintenance Training
 
Leading a Lean Implementation
Leading a Lean ImplementationLeading a Lean Implementation
Leading a Lean Implementation
 

Recently uploaded

Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 

Recently uploaded (20)

Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 

Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders

  • 1. 1© Life Cycle Institute Hack Warz® Cyber Attack A Hands-On Lab for Network Defenders
  • 2. 2© Life Cycle Institute Cybersecurity ensures information technology systems are available, reliable and secure Cybersecurity is… Software and hardware based Technical and non-technical Based on information from NSA, DoD, DISA and DoN
  • 3. 3© Life Cycle Institute Participants will learn how to: Explain best practices using NIST Standards and the Risk Management Framework (RMF) six-step process  Use the RMF methodology to outline an approach for a defense-in-depth strategy  Execute “white hat” attacks against IT systems in the hands-on Hack Warz lab 
  • 4. 4© Life Cycle Institute Hack Warz® Cyber Attack A Hands-On Lab for Network Defenders 1-day workshop .7 Continuing education units (CEUs) Private Workshops may be tailored to your specific needs and delivered at your site.
  • 5. 5© Life Cycle Institute Who Should Attend Advanced IT Professionals responsible for cybersecurity, including people who administer, integrate and develop systems. • IT Managers - CIO, DAA, CTO, CISO, ISSO, Head of Cybersecurity, Training Manager, Head of Innovation • DoD Program Managers • Technical Managers • Technical Directors • Requirements Officers
  • 6. 6© Life Cycle Institute CIA Triangle: Confidentiality, Integrity, Availability
  • 7. 7© Life Cycle Institute Security Policies and Procedures Why Create & Maintain an Information Security Policy? Why Create & Maintain Standard Operating Procedures? Why Create & Maintain Business Continuity and Disaster Recovery Procedures?
  • 8. 8© Life Cycle Institute Risk Management Framework (RMF) • Replaces DIACAP • 6-step process – aligns to DIACAP phases Categorize Select Implement Assess Authorize Monitor
  • 9. 9© Life Cycle Institute Hands-on Hack Warz Lab Ethical hacking competition Capture-the-flag event Gain exposure to hacker tools and common exploits Update defense-in-depth strategies using RMF methodology
  • 10. 10© Life Cycle Institute Reasons to Choose the Life Cycle Institute Extensive cybersecurity experience within DoD and commercial sector We provide vulnerability scanning, penetration testing, risk analysis and remediation services Our engineers are qualified mentors for industry-leading security trainers An active learning experience Learning by doing vs. lecture Group activities, assessments, case studies Network with peers Develop action plans to drive results post-training   
  • 11. 11© Life Cycle Institute Education@LCE.com www.LCE.com 800-556-9589 The Life Cycle Institute is the learning, leadership and change management practice at Life Cycle Engineering.

Editor's Notes

  1. Identify Protect Detect Respond Recover