Cyber Operations Workshop
This is NOT a death by PowerPoint, not a high-level theory type of workshop. This is a live fire, fingers-on-the-keyboard attack/defend/communicate training environment.
Classes are limited. Get registered!
Attendees will be grouped into two teams:
Team A will be tasked with gaining access to a highly protected network, finding and stealing critical data, and exfiltrating that data without being detected.
Team B will be tasked with monitoring the security products in the environment in an attempt to detect the attacks and remove the attackers from the environment.
Why choose the Center for Cyber Security Training
Interactive, classroom-based learning
Subject matter experts
Trusted by US government agencies