| 資安實戰攻防演練 Cyber Range

資安實戰攻防演練中心(Cyber Range) 
大世科子公司協志聯合科技(TISNet)建置資安實戰演練平台(Cyber Range) 提供防駭的專業教育訓練課程。
資安實戰演練平台是體驗智慧網路安全現實世界的平台。資安實戰演練平台是一種是模擬在IT及OT網路和典型應用威脅的環境。資安實戰演練平台並不僅僅專注於技術,而是一個全面性的IT及OT網路安全之攻防演練平台,且專注於人、技能、流程及資料,並且透過該平台模擬各式安全攻擊及防禦手法,使得安全管理人員在面對現實管理環境中有所遵循及參考。

大世科子公司協志聯合科技(TISNet)建置資安實戰演練平台(Cyber Range) 提供防駭的專業教育訓練課程

課程綱要 綱要
A. 防火牆及入侵攻擊模組
(Next Generation Firewall and IPS. These attack cases are detected mainly by FW and IPS systems using the signature based technology. Breaking Point system is used to generate the attacks .)
1. Threat detection with firewall 
2. Malware detection and analysis 
3. "SQL slammer" worm detection 
4. Application awareness and visibility 
5. Packet captures for attack investigation 
B. 網頁/網站攻擊模組 
(Web Security. Related to Web attacks that are built manually .)
1. Reputation based filtering 
2. Malware filtering 
3. Data leak prevention 
4. Web usage policy 
C. 電子郵件攻擊模組 
(Email Security. Related to email attacks that are built .)
1. Email spam 
2. Phishing attack 
3. Data Leak Prevention 
4. Viral email outbreak 
5. Keyword based scan 
D. 網路安全行為攻擊模組 
Network Behavior Based Detection (CTD). New for signature based detection system attack. 
1. Network behavior reputation 
2. Reconnaissance 
3. Data loss prevention 
4. Malware detection 
5. External attacks 
E. 身分認證攻擊模組 
(Identity Services Engine. Attack based on the identity spoofing technique. )
1. Device spoofing 
2. Shared credential policy violation
3. Identity location correlation
F. 無線安全攻擊模組 
(Wireless Security. Attack from wireless devices. )
1. Interference Detection 
2. Rogue AP Detection 
3. Wireless Attack Detection 
G.    安全分區防禦攻擊模組 
(TrustSec. Attack cases that are detected and remediated by ISE and TrustSec technologies. )
1. Same tag access control 
2. Tag based guest access 
H. 虛擬安全攻擊模組 
(Virtual Security. Attacks in virtual environment. )
1. Inter-VDC attacks 
2. Intra-VDC attacks  
3. Data leakage detection
I. 阻斷式攻擊模組 
(DDoS. Different DDoS attacks built with Breaking point. )
1. Volumetric attacks 
2. Reflection attacks 
3. State exhaustion 
4. Application layer attacks 
5. Advanced DDoS attacks 
J. 控制型入侵攻擊模組 
(Hacking and C&C module. About Command and Control setup and technique to detect the attacks via the identification of connection to CC server. )
1. Command & Control through weaponized Word document 
2. Command & Control through server vulnerability
K. 混合式攻擊模組 
(Mixed attacks)
1. Malware APT Attack 
2. Email end user education APT Attack 
3. Application Visibility Practice Lab 
4. Stage Attack APT 
5. Multi-Vector APT Attack