Respond to Phishing and Exfil-Operation Angry Tiger-Mission 6
Rated 3.5/5 based on 11 customer reviews

Respond to Phishing and Exfil-Operation Angry Tiger-Mission 6

Available: In Stock
$0.00

Image

Scenario Overview: 

The intelligence sharing sites have reported that energy companies are detecting an increasing number of phishing emails that pose cyber-security risks to their Information Technology (IT) and Operational Technology (OT) infrastructure. It is unclear what the intent is of the attack but it is feared that it could be the start of exfiltration theft of intellectual property or even destructive threats to energy services_ These companies fear that multiple cyber-attacks could cause significant financial damage and Public Relations concerns.

How to be Successful:

The learner will conduct a risk assessment of a company's existing network structure and its cyber risk posture for possible phishing attacks. They will need to understand the threat vectors used in the cyber attacks and review any detectable weaknesses to ensure no malicious activity is occurring on the network currently.

What should you know prior:

Learners should be familiar with incident response processes, windows & *nix system administration and network monitoring tools.

DEFENSIVE
Click For Video
Load Time

Easy: 15 min

Medium: 15 min

Time Limit 40 hrs
# of Tasks 5
Hints Yes
Save Session Yes
Team Based Yes

Scenario Overview: 

The intelligence sharing sites have reported that energy companies are detecting an increasing number of phishing emails that pose cyber-security risks to their Information Technology (IT) and Operational Technology (OT) infrastructure. It is unclear what the intent is of the attack but it is feared that it could be the start of exfiltration theft of intellectual property or even destructive threats to energy services_ These companies fear that multiple cyber-attacks could cause significant financial damage and Public Relations concerns.

How to be Successful:

The learner will conduct a risk assessment of a company's existing network structure and its cyber risk posture for possible phishing attacks. They will need to understand the threat vectors used in the cyber attacks and review any detectable weaknesses to ensure no malicious activity is occurring on the network currently.

What should you know prior:

Learners should be familiar with incident response processes, windows & *nix system administration and network monitoring tools.

DEFENSIVE
Click For Video
Load Time

Easy: 15 min

Medium: 15 min

Time Limit 40 hrs
# of Tasks 5
Hints Yes
Save Session Yes
Team Based Yes