Computer Network Attack / Hacking / Red Team
Learn to attack and think like an attacker. Only by having this knowledge are you able to defend networks and system. Without Red Team knowledge you are fighting a battle where you do not understand your enemy. This basic principle was well understood well before the existence of computing.
“If you know the enemy and know yourself, you needSun Tzu – Art of War
notfear the resultof a hundred battles. If you know yourself but not the enemy, for everyvictory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”
Computer Network Defense (CND) / Blue Team
Utilizing layered defensive techniques and first-hand knowledge of proper configuration, testing, maintenance, and upgrades Blue Team students learn to apply their broad knowledge of threats, techniques, and best practices to create and operate
Computer Network Attack (CNA)
The Sun Tzu quote above spells it out. We have been making this clear since we started. we are glad to see the industry picked it up. While everyone says they do it. We actually have the knowledge/skills to help others learn
Digital Forensics / Analysis (DFIR)
The Blue Team is at a significant disadvantage. This asymmetric challenge results in loss/breaches. Digital Forensics and Incident Response (DFIR) is a highly specialized skill set and detailed knowledge to be effective. We educate DFIR students in threat detection, breach detection, threat hunting, attribution, and many more investigative techniques. While our training focuses on efficiently finding answers, we also have specific training on working with law enforcement, intelligence, and the military.
Threat Intelligence (TI)
Threat intelligence is an essential component of cyber defense. The CWR works with our members to collaboratively analyze, investigate, and make actionable recommendations to defend their digital presence. This effort is a synergy of automation, distributed computing, deep learning, and human efforts. The results are transformative.
For more visit our dedicated Information Sharing and Analysis Organization (ISAO) web site. www.cwr-isao.org