Tournament: Core Network
Attendance options: face-to-face
Registration: All students enrolled in the 4-6-day course are eligible to play Netwars for free. Registering for this event is made through the SANS account dashboard during the week of the event.
About the Core Network: With the most comprehensive network range, this ultimate multidisciplinary cyber range enhances the most diverse cyber skills. This range is perfect for moving forward your cybersecurity skills in today’s dynamic threat situation. The winning team and the top five solo players from all core network tournaments will be offered the opportunity to compete in the annual SANS Core Netwars Tournament of Champions.
Computer requirements: Internet-based
Browser: Chrome, Firefox, Safari, or Edgememory: 8GB
Recommended: All InfoSec practitioners at all levels. It is recommended that students have basic or fundamental knowledge of information technology and technical topics, but not required.
Areas: Cybersecurity 101, Cyber defense, penetration testing, digital forensics, incident response, cloud computing.
Example topic:
Trivia Three Hunting with Hardware Hacking Mobile App Analysisnerd graphqllinux and Elk Stackweb Applications including Windows Command Line Skills, Threat Intelligent Script Ground Penetration Test Test for PowerShell, Curl, JQWindows, Web Server, Network Forensicscyber
Interactive scenario: Some SAN students are relaxing in their local arcades after learning new elite cyber skills for a long time. Suddenly, they are drawn into a digital world dominated by AI! Is it merciful? Will they run away? Will they get it back in time for class tomorrow?
Tournament: Cyber Defense Network
Attendance options: face-to-face
Registration: All students enrolled in the 4-6-day course are eligible to play Netwars for free. Registering for this event is made through the SANS account dashboard during the week of the event.
About Cyber Defense Network: Focuses on prevention, analysis and defense of complex real-world attack scenarios, such as brute-force attacks and ransomware campaigns.
Computer Requirements: Laptop/Desktop Based
Processor: 64-bit, x86, 2.0 GHz+Memory: 16GB (8GB possible due to poor performance) HD: 40GB+Free Operating System: Windows 10 or later, Mac OS 10.15 or later, Linuxvirtualization Software: VMware
Additional requirements: You must download the file to join.
Recommended: Experienced security administrators, enterprise defenders, architects, network engineers, incident responders, security operations specialists, security analysts, builders and breakers.
Areas: Cyber defense, blue team.
Example topic:
Cyber Defense Hunting Log AnalysisPacket AnalysisAnalysisWindows Administrationlinux Administrationwork Security MonitoringContinuous Security MonitoringSteganography
Interactive scenario: Chaos reigns in the homes of seven kingdoms. The family should be united, but as you are brought in to protect the kingdom, you may be competing for the next heir to the throne. Prominent houses are beginning to side with increasing secret attacks. Are you ready to help protect the seven kingdoms?
Source link