Power Grid Incident Response-Operation Black Dragon-Mission 13
Rated 3.5/5 based on 11 customer reviews

Power Grid Incident Response-Operation Black Dragon-Mission 13

Available: In Stock
$0.00

Image

Scenario Overview: 

Intelligence reports that the power grids in the Nation of Formica are being targeted by an advanced cyber threat actor who seeks to demonstrate its global power. Experts are concerned that smart grid technologies, which use the Internet to connect to power meters and appliances, could allow an attacker to overtake thousands-if not millions-of unprotected devices, preventing power from being delivered to end users.

How to be Successful:

The learner will conduct a cyber defense assessment to evaluate risks, determine indicators of compromise, improve network monitoring and mitigate the attack. The end state of the assessment will be a defensible power grid with local defender ability to detect attempts to compromise the grid as well as the ability to attribute any attacks and respond accordingly.

What should you know prior:

Learners should be familiar with digital forensics, cryptography, identify management, vulnerability assessment, web technology and enterprise architecture.

DEFENSIVE
Click For Video
Load Time 17 min
Time Limit 40 hrs
# of Tasks 6
Hints Yes
Save Session Yes
Team Based Yes

Scenario Overview: 

Intelligence reports that the power grids in the Nation of Formica are being targeted by an advanced cyber threat actor who seeks to demonstrate its global power. Experts are concerned that smart grid technologies, which use the Internet to connect to power meters and appliances, could allow an attacker to overtake thousands-if not millions-of unprotected devices, preventing power from being delivered to end users.

How to be Successful:

The learner will conduct a cyber defense assessment to evaluate risks, determine indicators of compromise, improve network monitoring and mitigate the attack. The end state of the assessment will be a defensible power grid with local defender ability to detect attempts to compromise the grid as well as the ability to attribute any attacks and respond accordingly.

What should you know prior:

Learners should be familiar with digital forensics, cryptography, identify management, vulnerability assessment, web technology and enterprise architecture.

DEFENSIVE
Click For Video
Load Time 17 min
Time Limit 40 hrs
# of Tasks 6
Hints Yes
Save Session Yes
Team Based Yes