Improve your network defenses by (safely) hacking yourself. In this course, we'll walk you through the ins and outs of Breach and Attack Simulation.
Lesson 1 - Breach and Attack Simulation Basics
Introduces the concept of breach and attack simulation (BAS) and discusses its benefits for improving network security.
Lesson 2 - What is Breach and Attack Simulation?
Provides a more detailed overview of BAS, including the different types of attacks that can be simulated and the ways in which BAS tools can be used to improve security posture.
Lesson 3 - Getting to Know Your Tool
Walks through the process of setting up and using a BAS tool, with a specific focus on the Keysight Breach Attack Simulation (BAS) tool.
Lesson 4 - Deploying Your First Agent
Shows how to deploy a BAS agent on a target machine, so that the tool can start simulating attacks against that machine.
Lesson 5 - Executing a Data Exfiltration Assessment
Demonstrates how to use a BAS tool to simulate a data exfiltration attack, which is a common way for attackers to steal sensitive data from a target network.
Lesson 6 - Putting it All Together: Validating an Azure Web Application Firewall (WAF)
Shows how to use a BAS tool to validate the configuration of an Azure Web Application Firewall (WAF), which is a security appliance that can help to protect web applications from attack.
Lesson 7 - Conclusion - Breach and Attack Simulation
Summarizes the key concepts covered in the course and provides some resources for further learning about BAS.
Go Hack Yourself-Achieving SecOps Success with Breach and Attack Simulation
Breach and Attack Simulation Basics.
Network Performance and Security Products
The current web page context is a brochure for the network performance and security products by Keysight Technologies. The brochure introduces four products that help customers avoid attacks and maintain peak performance with dynamic network intelligence. The brochure explains the features and benefits of each product, such as: - Threat Simulator: a breach and attack simulation platform that safely simulates the entire kill chain on the production network, measures risk, exposes gaps, and provides step-by-step remediations. - ThreatARMOR: a threat intelligence gateway that blocks malicious IP traffic from entering the network by using a continuously-updated database of known attackers and untrusted locations. - Hawkeye: an active network monitoring platform that continuously tests, validates, and monitors quality of service for various applications, from the data center to the network edge. - SSL VPN Gateway Assessment Service: a testing as a service offering that validates the VPN capacity and performance with a controlled, realistic test. The brochure also provides some technical specifications of each product, such as: - Threat Simulator: supports various types of attacks, such as malware, spear phishing, data exfiltration, and cryptojacking; integrates with SIEM tools like IBM QRadar and Splunk; updates attack library continuously from Keysight Application and Threat Intelligence Research Center. - ThreatARMOR: supports high voltage (up to 3 kV) and high current (up to 1500 A) capabilities; provides safety and reliability features, such as overcurrent protection, overvoltage protection, soft start function, and interlock function; offers easy and intuitive operation with a plug-in DUT workflow. - Hawkeye: supports node-to-node, mesh, real service, application/web/Wi-Fi monitoring; provides basic and advanced metrics; generates SNMP and email alarms; enables API control; leverages machine learning for anomaly detection. - SSL VPN Gateway Assessment Service: performs bandwidth-per-tunnel test, usage capacity test, connection time test, throughput analysis; has no impact on live network; requires SSL VPN address as input. The brochure also includes some keysight.com URLs for more information on each product and other Keysight products and services, such as: - www.keysight.com/find/threatsimulator - www.keysight.com/find/threatarmor - www.keysight.com/find/hawkeye - www.keysight.com/find/sslvpn The brochure also provides some identifiers and ordering information for each product and its accessories, such as: - Threat Simulator: PD1500A-MF (mainframe), PD1500A-HVM (high voltage module), PD1500A-HCM (high current module), PD1500A-LCM (low current module), PD1500A-HD (heating device), PD1500A-CAL (calibration kit). - ThreatARMOR: N5173B-Gxx (Good bundle), N5183B-Bxx (Better bundle), E8257D-Dxx (Best bundle), where xx = frequency option (13/20/32/40/50/67). - Hawkeye: virtual/software endpoints (Docker, Cloud, Android, iOS, Windows, Linux, Mac), Vision E1S NPB (large offices), IxProbe (branch locations or small offices), XRPI (small offices). - SSL VPN Gateway Assessment Service: no identifiers or ordering information provided. The brochure also provides some sales information for each product, such as: - Threat Simulator: available for order now; supported by Keysight's worldwide network of service centers and technical support teams; comes with a standard three-year warranty. - ThreatARMOR: available for order now; supported by Keysight's worldwide network of service centers and technical support teams; comes with a standard three-year warranty. - Hawkeye: available for order now; supported by Keysight's worldwide network of service centers and technical support teams; comes with a standard three-year warranty. - SSL VPN Gateway Assessment Service: available for order now; supported by Keysight's worldwide network of service centers and technical support teams. This is a marketing overview of the current web page context based on the user's request.