Red vs Blue
Mile2’s Ultimate Red vs Blue Team Course is built to provide intense hands-on sessions that emulates real-world cyber warfare and defense scenarios. You will implement principles and behaviors you have learned to combat malicious hackers that use advanced threat techniques.
The intent is that the students will have 3 – 4 hours to interact with each section. In the Day 1 Morning scenario, you will access Proximo and Gracchus. The Day 2 Afternoon work will be in Priscus and Verus. Then, in the Day 2 Morning scenario you will access Maxiums and Quintas. Finally, Day 2 Afternoon work will be in Tetraites and Cummodus.
In each segment of Red vs Blue you will have the first 30 minutes to organize your team. After this, you will have up to 3 hours and 30 minutes to attack the other machines and to place your team name in the flag.txt file. Once a team name is in the flag.txt file, it cannot be removed. The team that places their team name in as many flag.txt files as possible will be the winning team for that segment.
Key Course Information
Live Class Duration: 2 Days
Language: English
Class Formats:
* Instructor-led
* Live Virtual Training
Suggested Prior Knowledge:
* Networking
* Understanding Scanning and Vulnerabilities
* Network Technologies
* TCP/IP
* Microsoft Packages
* Basic Linux knowledge
CPEs: 24
Modules
- Module 1 – Kali vs Proximo and Gracchus
- Module 2 – Kali vs Priscus and Verus
- Module 3 – Kali vs Maximus and Quintus
- Module 4 – Kali vs Tetraites and Commodus
Modules
Participants in Red vs Blue will be using both open source and commercial tools in a controlled virtual cyber range. Some tools/applications that will be used are nmap, db-exploit, Metasploit through Kali Linux, Empire, and Microsoft PowerShell.
Who Should Attend?
* Penetration Testers
* Microsoft Adminstrators
* Security Administrators
* Cybersecurity Engineers
Accreditations
Red vs Blue: Day One Format
MORNING
Required VMs:
• Kali-RvB
• Win10-RvB
• Proximo (Linux)
• Gracchus (Linux)
Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.
AFTERNOON
Required VMs:
• Kali-RvB
• Win10-RvB
• Priscus (Windows 7)
• Verus (Windows XP)
Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.
Red vs Blue: Day Two Format
MORNING
Required VMs:
• Kali-RvB
• Win10-RvB
• Paximus (Linux)
• Quintus (Linux)
Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.
AFTERNOON
Required VMs:
• Kali-RvB
• Win10-RvB
• Tetraites (Windows 2K12)
• Commodus (Windows 10)
Objective: Set defenses in the Blue portion of the Scenario and place your team name in both flag.txt files during the Red portion of the Scenario. If possible, sever access to your systems from other teams if they are connected.
Course exams are individually priced. NOTE: You may purchase the exam without purchasing the course.
Exam cost is not included with the purchase of a live class.
The cost of the exam is included with purchase of an Ultimate self-study combo.
Red vs Blue: End Goals
Graduates of mile2’s Red vs Blue Team scenario-based events will:
1. Become more versed with tools and applications, such as Metasploit, Kali Linux and Microsoft PowerShell.
2. Piece together a team that will focus on attack-based skill sets.
3. Assess existing penetration testing and incident response teams.
4. Prevent and defend against cyber-attacks.