Your cybersecurity team will participate in a half-day, instructor-led, online training mission without the commitment of an annual subscription.
In this scenario, the system sends an infected e-mail with a link to a Trojan executable. When the executable is opened, a Trojan is installed and performs a local search of secret files and sends them to the attacker by e-mail. Participants experience first-hand the entire attack chain of a successful spear-phishing campaign demonstrating a real-world example of system compromise and exfiltration of sensitive information referencing examples of high-profile attacks when spear-phishing was used include the attack on RSA, HBGary Federal and Operation Aurora (attack on Google).
This course is for the Intermediate level student and useful skills to be familiar with would be Windows log management, sendmail email server, windows scripting, Checkpoint firewalls and MicroFocus ArcSight.
If you are a Tech Data Partner and would like to order a seat for this course for your team or to resell to a customer, please click the “Partner Pricing” button below which will forward you to the Tech Data eCommerce platform to order your course seats. You may send an email to cyberrangecloudUS@techdata.com for additional course details or ordering assistance.