Date: 16 May 2022
Location: Online

With the focus on security, most organisations test the security defenses via pen-testing. But what about after the network has been compromised. Is there an Advance Persistent Threat (APT) sitting on the network? Will the defenses be able to detect this?

This webinar will discuss some of the open source tools that can help simulate this threat. So as to test the security defenses if an APT makes it onto the network.

Target Audience

  • System/Network Engineers, Network Managers and Operators, and Security policy makers who are interested in network security and want to gain an understanding of BAS tools.


It is assumed that participants have a basic understanding of:

  • Network operations, Internet technologies, OSI reference model and TCP/IP.
  • Pentesting, red/blue/purple team skillsets and security auditing
  • Basic Linux command line (CLI) skills.

We recommend the following Academy courses be completed before the start of the tutorial:

Workshop topics

  • What is Breach and Attack Simulation (BAS)
  • Why Use BAS tools
  • Overview of the MITRE ATT&CK Matrix
  • List of Open Source tools
  • Overview of the various tools
  • Setting up a simulation

Other requirements

  • Computer with Zoom, or access to Zoom's web interface

Workshop Items

  • Agenda (includes links to presentations and schedule)
  • Trainers: Warren Finch (APNIC)
  • bas-20220516-online.txt
  • Last modified: 2022/04/20 06:17
  • by warren