05
Threat Defiance Report

2018 Training Schedule

2018 Training Schedule

Texas

Adversary Tactics and Techniques

 Jan 8 - Feb 9 

Mar 12 - Apr 13

Apr 23 - May 25 

May 29 - Jun 29 

Jul 30 - Aug 31 

Oct 8 - Nov 9 

Cyber Threat Intelligence Analysis

Feb 12 - 16 

Jul 16 - 20

Oct 1 - 5 

HUNT Certification Courses

Mar 12 - 16 [Windows] 

Mar 19 - 23 [Linux] 

Apr 2 - 6 [Windows] 

Apr 9 - 13 [Network] 

Apr 16 -20 [Linux] 

Sept 10 -14 [Windows] 

Sept 17 - 21 [Lunux] 

Sept 24 -28 [Network] 

Colorado

Adversary Tactics and Techniques 

Mar 5 - Apr 6 

Jul 30 - Aug 31 

Cyber Threat Intelligence Analysis 

May 21 - 25 

Dec 17 - 21 

HUNT Certification Courses 

Jun 4 - 8 [Windows] 

Jun 11 - 15 [Linux] 

Jun 18 - 22 [Network] 

Jul 9 - 13 [Windows] 

Jul 16 - 20 [Linux] 

Jul 23 - 27 [Network] 

Sept 17 - 21 [Windows] 

Nov 26 - 30 [Windows] 

Dec 3 - 7 [Linux] 

Dec 10 - 14 [Network] 

Hawaii

Adversary Tactics and Techniques 

Jan 15 - Feb 16 

May 29 - Jun 29 

Sept 17 - Oct 19 

Cyber Threat Intelligence Analysis 

Jul 9 - 13 

Nov 26 - 30 

HUNT Certification Courses 

Apr 2 - 6 [Windows] 

Apr 9 - 13 [Linux] 

Apr 16 - 20 [Network] 

Jul 16 - 20 [Windows] 

Jul 23 - 27 [Linux] 

Jul 30 - Aug 3 [Network] 

Sept 10 -14 [Lunux] 

Dec 3 - 7 [Windows] 

Dec 10 - 14 [Linux] 

Dec 17 - 21 [Network] 

Maryland

Adversary Tactics and Techniques 

Jan 29 - Mar 2 

Apr 2 - May 4 

Jul 9 - Aug 10 

Aug 27 - Sept 28 

Oct 1 - Nov 2 

Nov 13 - Dec 14 

Cyber Threat Intelligence Analysis 

Nov 5 - 9 

HUNT Certification Courses 

Jan 8 - 12 [Windows] 

Jan 15 - 19 [Linux] 

Jan 22 - 26 [Linux] 

Mar 5 - 9 [Windows] 

Mar 12 - 16 [Linux] 

May 7 - 11 [Windows] 

May 14 - 18 [Lunux] 

May 21 - 25 [Networks] 

Jun 4 - 8 [Linux] 

Jun 11 - 15 [Windows] 

 

ATT - ADVERSARY TACTICS AND TECHNIQUES (5 WEEKS)

root9B’s Adversary Tactics and Techniques course is an intense 5-week hands-on course that teaches students the methodology and technical details of how attackers recon, gain access to, pivot, and remain hidden within a target network, and any artifacts their actions may leave behind. Whether they’re on a path to become pen-testers, red team members, or cyber defenders, the Adversary Tactics and Techniques course prepares students to excel by establishing a rm foundation in operational cyber exploitation methodologies. The course takes students with a basic understanding of computers and computer networks to a level where they are capable of executing fundamental exploitation operations in Windows and Linux environments.

CTIA - CYBER THREAT INTELLIGENCE ANALYSIS (1 WEEK)

root9B’s 1-week Cyber Threat Intelligence Analysis course teaches network defenders to collect, analyze and apply targeted intelligence to defensive operations in order to proactively act on and adapt to sophisticated, dedicated attacks by cyber adversaries. This course applies the Intelligence Analysis process to the full-spectrum cycle of proactive network defense. The principle objective of this course is to equip network defenders, intelligence analysts, and other security operations personnel with a modern methodology to characterize, investigate, attribute, and respond to advanced cyber threats in a collaborative, real-time environment.

HUNT [WINDOWS] (1 WEEK)

root9B’s Hunt course for Windows operating systems introduces cyber security professionals to the digital arena of real-time, proactive adversary detection and identification. This course teaches students how to efficiently characterize and interrogate remote Windows systems in order to collect, analyze, and identify advanced cyber threats that evade traditional detection mechanisms. Students will demonstrate the ability to recognize indicators of malicious code, lateral movement, and evidence of adversary presence within Windows hosts. This course is ideal for cybersecurity professionals who need to learn how to ‘Hunt’ within their Windows networks for Advanced Persistent Threats that have eluded detection by automated enterprise security solutions.

HUNT [LINUX] (1 WEEK)

root9B’s Hunt course for Linux operating systems provides cybersecurity professionals with methodologies to actively defend Linux systems and discover advanced threats. Students will demonstrate the ability to characterize systems, perform local and remote enumeration, collect data, and perform real-time analysis, detection, and identification of adversary attacks. Students will learn the tactics and techniques employed by adversaries, with an emphasis on Linux system manipulation and persistence techniques to bypass cybersecurity systems and infrastructure. This course is designed for cyber security professionals who need to learn the skills, knowledge, and methodologies required to determine if an adversary is successfully avoiding detection from automated security products.

HUNT [NETWORKS] (1 WEEK)

root9B’s Hunt course for Network Infrastructure focuses on preserving the integrity of devices and systems that serve as the conduit of information across networks. This course emphasizes the aggregation, correlation, and analysis of data across multiple network systems (i.e., IDS, Syslog/Windows Events, Netflow, Authentication) in order to identify sophisticated and tailored adversary attacks. Students will demonstrate how to actively and passively enumerate and characterize systems, verify configurations, validate the integrity of those systems and the data flows between them. Adversary tactics, techniques and procedures will be replicated in a controlled environment where students will perform Hunt operations in order to detect malicious activity.