搜索条件
找到 1 条目
每页显示结果数
搜索结果
-
- Type:
- Student Work
- 摘抄:
- Exploiting systems using known vulnerabilities has become a concern for companies. To protect their systems, penetration testers are being offered lucrative contracts to find vulnerabilities and exploits on a company’s system. Our team noticed there are many training programs for penetration testers and red teamers to hone their skills. When looking for blue-team training programs, there are much fewer, making it difficult for IT professionals to train on how to defend against such attacks. Our team set out to create labs in which an attack has already occurred, and it is up to the user to diagnose the attack, research the incident, and return the system to a working state. Our goal was to create an environment that simulates real world attacks and give the user tools to take out the attack.
- 作者:
- David, Johnny; Rolfes, Mitchell, and Schumaker, Lukas
- 提交者:
- CECH Library Service
- 上传日期:
- 09/14/2023
- 更改日期:
- 09/14/2023
- 创建:
- 2022-04
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
