Areas of Focus

Computer Network Attack / Hacking / Red Team

Learn to attack and think like an attacker. Only by having this knowledge are you able to defend networks and system. Without Red Team knowledge you are fighting a battle where you do not understand your enemy. This basic principle was well understood well before the existence of computing.

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”

Sun Tzu – Art of War

Computer Network Attack (CNA)

The Sun Tzu quote above spells it out. We have been making this clear since we started. we are glad to see the industry picked it up. While everyone says they do it. We actually have the knowledge/skills to help others learn Red Team (attack) skills for the real-world.

Computer Network Defense (CND) / Blue Team

Utilizing layered defensive techniques and first-hand knowledge of proper configuration, testing, maintenance, and upgrades Blue Team students learn to apply their broad knowledge of threats, techniques, and best practices to create and operate well designed networks/systems.

Digital Forensics / Analysis (DFIR)

The Blue Team is at a significant disadvantage. This asymmetric challenge results in loss/breaches. Digital Forensics and Incident Response (DFIR) is a highly specialized skill set and detailed knowledge to be effective. We educate DFIR students in threat detection, breach detection, threat hunting, attribution, and many more investigative techniques. While our training focuses on efficiently finding answers, we also have specific training on working with law enforcement, intelligence, and the military.

Threat Intelligence (TI)

Threat intelligence is an essential component of cyber defense. The CWR works with our members to collaboratively analyze, investigate, and make actionable recommendations to defend their digital presence. This effort is a synergy of automation, distributed computing, deep learning, and human efforts. The results are transformative.

For more visit our dedicated Information Sharing and Analysis Organization (ISAO) web site.