Defend Against Web Attack-Operation Bold Hermit-Mission 12
Rated 3.5/5 based on 11 customer reviews

Defend Against Web Attack-Operation Bold Hermit-Mission 12

Available: In Stock
$0.00

Image

Scenario Overview: 

Incidence response teams have been deployed across numerous government agencies, to provide emergency communications for critical operations to defend against attackers. These teams require reliable 24/7/365 communication in order to send and receive critical information pertaining to the terrorist attacks. A domestic terrorist organization has been making attempts to cut off, or hack, communications of deployed emergency management personnel. This terrorist has been known to make use of common Web application vulnerabilities to achieve their goals.

How to be Successful:

The learner will monitor for attacks, isolate them, and add additional defenses as necessary to prevent the attacks from being successful. They will need to identify relevant details about the attack in order to pass along to other personnel who may not have been hit yet_ The more details you provide, the better positioned others will be to defend against these attacks.

What should you know prior:

Learners should be familiar with incident response processes, network design, management and security.

DEFENSIVE
Click For Video
Load Time

Easy: 13 min

Medium: 14 min

Time Limit 40 hrs
# of Tasks 7
Hints Yes
Save Session Yes
Team Based Yes

Scenario Overview: 

Incidence response teams have been deployed across numerous government agencies, to provide emergency communications for critical operations to defend against attackers. These teams require reliable 24/7/365 communication in order to send and receive critical information pertaining to the terrorist attacks. A domestic terrorist organization has been making attempts to cut off, or hack, communications of deployed emergency management personnel. This terrorist has been known to make use of common Web application vulnerabilities to achieve their goals.

How to be Successful:

The learner will monitor for attacks, isolate them, and add additional defenses as necessary to prevent the attacks from being successful. They will need to identify relevant details about the attack in order to pass along to other personnel who may not have been hit yet_ The more details you provide, the better positioned others will be to defend against these attacks.

What should you know prior:

Learners should be familiar with incident response processes, network design, management and security.

DEFENSIVE
Click For Video
Load Time

Easy: 13 min

Medium: 14 min

Time Limit 40 hrs
# of Tasks 7
Hints Yes
Save Session Yes
Team Based Yes