Breach and Attack Simulation (BAS) Tools Webinar
Date: 16 May 2022
Location: Online
Synopsis
With the focus on security, most organisations test the security defenses via pen-testing. But what about after the network has been compromised. Is there an Advance Persistent Threat (APT) sitting on the network? Will the defenses be able to detect this?
This webinar will discuss some of the open source tools that can help simulate this threat. So as to test the security defenses if an APT makes it onto the network.
Target Audience
- System/Network Engineers, Network Managers and Operators, and Security policy makers who are interested in network security and want to gain an understanding of BAS tools.
Pre-requisites
It is assumed that participants have a basic understanding of:
- Network operations, Internet technologies, OSI reference model and TCP/IP.
- Pentesting, red/blue/purple team skillsets and security auditing
- Basic Linux command line (CLI) skills.
We recommend the following Academy courses be completed before the start of the tutorial:
- Network security fundamentals: https://academy.apnic.net/en/webinar-courses/network-security-fundamentals/
- Introduction to Cybersecurity: https://academy.apnic.net/en/course/introduction-to-cybersecurity/
- Linux Basics virtual lab: https://academy.apnic.net/en/virtual-labs/
Workshop topics
- What is Breach and Attack Simulation (BAS)
- Why Use BAS tools
- Overview of the MITRE ATT&CK Matrix
- List of Open Source tools
- Overview of the various tools
- Setting up a simulation
Other requirements
- Computer with Zoom, or access to Zoom's web interface
Workshop Items
- Agenda (includes links to presentations and schedule)
- Trainers: Warren Finch (APNIC)