CLICK HERE TO REGISTER FOR THIS SESSION! In this hands-on workshop, we will follow the steps of an attack from a red team perspective and
consider how to remediate the actions for each phase from a blue team perspective. You can expect to
increase your knowledge of the following:
● Five phases of an attack: Recon, Scanning, Gaining Access, Maintaining Access, Covering Tracks.
● How to use Kali Linux to gain access to a remote host.
● How to defend against certain types of attacks.
● Topics associated with the EC-Council CEH certification.
● Topics associated with the CompTIA PenTest+ certification
In a hat-tip to cyber competitions, there will be flags planted throughout for participants to find.