Student Work

 

Blue Team Defense Open Access Deposited

Downloadable Content

File thumbnail: 33_3688353_155289783_IT2021_Johnny_David_Mitchell_Rolfes_Lukas_Schumaker.pdf Download PDF
Download Adobe Acrobat Reader
Date Uploaded: 09/14/2023
Date Modified: 09/14/2023

Exploiting systems using known vulnerabilities has become a concern for companies. To protect their systems, penetration testers are being offered lucrative contracts to find vulnerabilities and exploits on a company’s system. Our team noticed there are many training programs for penetration testers and red teamers to hone their skills. When looking for blue-team training programs, there are much fewer, making it difficult for IT professionals to train on how to defend against such attacks. Our team set out to create labs in which an attack has already occurred, and it is up to the user to diagnose the attack, research the incident, and return the system to a working state. Our goal was to create an environment that simulates real world attacks and give the user tools to take out the attack.

Creator
License
Submitter
College
Department
Date Created
Advisor
  • Hopperton, Tyler

Relationships

In Collection:

Items

Permanent link to this page: https://scholar.uc.edu/show/nv935445r