Tournament: Core Network
Attendance options: face-to-face
Registration: All students enrolled in the 4-6-day course are eligible to play Netwars for free. Registering for this event is made through the SANS account dashboard during the week of the event.
About the Core Network: With the most comprehensive network range, this ultimate multidisciplinary cyber range enhances the most diverse cyber skills. This range is perfect for moving forward your cybersecurity skills in today’s dynamic threat situation. The winning team and the top five solo players from all core network tournaments will be offered the opportunity to compete in the annual SANS Core Netwars Tournament of Champions.
Computer Requirements: Browser-based
RAM Chrome, Firefox, Safari, or Edge Browsers 8GB
Recommended: All InfoSec practitioners at all levels. It is recommended that students have basic or fundamental knowledge of information technology and technical topics, but not required.
Areas: Cybersecurity 101, Cyber defense, penetration testing, digital forensics, incident response, cloud computing.
Example topic:
Trivia Three Hunting with Hardware Hacking Mobile App Analysisnerd graphqllinux and Elk Stackweb Applications including Windows Command Line Skills, Threat Intelligent Script Ground Penetration Test Test for PowerShell, Curl, JQWindows, Web Server, Network Forensicscyber
Interactive scenario: Some SAN students are relaxing in their local arcades after learning new elite cyber skills for a long time. Suddenly, they are drawn into a digital world dominated by AI! Is it merciful? Will they run away? Will they get it back in time for class tomorrow?
Tournament: DFIR Netwars
Attendance options: face-to-face
Registration: All students enrolled in the 4-6-day course are eligible to play Netwars for free. Registering for this event is made through the SANS account dashboard during the week of the event.
About DFIR Netwars: This tool-independent approach focusing on digital forensics, incident response, threat hunting, and malware analysis covers everything from low-level artifacts to high-level behavioral observations.
Computer Requirements: Laptop/Desktop Based
Processor: 64-bit, X86, 2.0 GHz+Memory: 16GB (8GB possible with reduced performance) Dongle with Type A or Type A Operry System: Windows 10 or later, Mac OS 10.15 or later, Linux Virtualization Software: VMware – Students are proprietary It is expected to provide forensic tools or use local VMware VM tools that provide Extra requirements: file downloads are required to join.
Recommended: Experienced Digital Forensic Analysts, Forensic Examination Officers, Media Exploitation Examination Officers, Malware Analysts, Incident Responders, Threat Hunters, Security Operations Center (SOC) Analysts, Law Enforcement Officers, Federal Agents, Detectives, and cybercrime investigators.
Discipline: Digital forensics, incident response.
Example topic:
Threat Hunting Malware Analytic Shift Workstation Media Explosion Arifact Analysis Analysis Tri-Agemarie Attack Network Traffic Analytic Factors and Debug Intrusion Detection
Interactive Scenarios: As a DFIR specialist, you will be provided with a set of mystical compromised systems and evidence files from traditional computing environments. Your mission? Use your DFIR skills to shed light on attack vectors, compromise metrics, and other evidence needed to resolve incidents.
Source link