CYBER BUYER LLC trusted cybersecurity compliance
  • About Us
  • Our Services
  • News & Media
  • Contact Us
Schedule A Call
  • Assessment Type
    Asset & Expense Management AssessmentBreach Notification Plan AssessmentBusiness Continuity Planning AssessmentCMMCCompliance AssessmentCompliance Data Center Technology Cyber Security CloudCyber Risk AssessmentCyber Security Program Development AssessmentDisaster Recovery Planning AssessmentEmail Threat AssessmentGovernance Program DevelopmentHIPAAHITECHHITRUSTISSO 27001Incident Response Plan AssessmentPolicy Review AssessmentPre Audit Readiness AssessmentPrivacy AssessmentReadiness Assessment - CMMC, SOC, HITRUST, HIPPA, HITECH, ISO 27001Regulatory Compliance Gap Assessment (GDPR, CCPA, CMMC)Security Impact AssessmentShort Tenure Time WatchSOC 1SOC 2SOC 3SOC for CybersecuritySOC for Vendor Supply ChainThird-Party Risk AssessmentVendor Risk Management Assessment
  • Product Type
    Access ManagementActive Directory Security (AD)Antivirus
    Next-Generation Antivirus (NGAV)
    API SecurityApplication SecurityAssessment
    Email Threat AssessmentMicrosoft 365 Security Compliance AssessmentEndpoint Security AssessmentInsider Threat Assessment
    Asset Discovery & ManagementAttack Surface Management (ASM)AuditAwareness TrainingAWS MarketplaceBackup as a Service (BaaS)Bot SecurityBrand ProtectionCISO as a ServiceCollaboration Security
    Slack SecurityMicrosoft Teams SecurityZoom SecuritySalesforce Chatter SecurityTelegram SecurityWeChat SecurityWhatsApp Security
    Cloud Access Security Broker (CASB)Cloud Security
    AWS Cloud SecurityAzure Cloud SecurityGoogle Cloud Security
    Cloud VPNContinuous Controls Monitoring (CCM)Compliance
    SOC 2
    Consulting ServicesCyber Asset Attack Surface Management (CAASM)Data Governance SolutionsData Privacy ManagementData ProtectionDDoS ProtectionDisaster Recovery as a Service (DRaaS)Email Security
    Cloud Email Security SoftwareDMARC - Domain-Based MessageEmail Anti-Spam SoftwareEmail Encryption SoftwareIntelligent Email Protection SoftwareMicrosoft Office 365 Email SecurityGoogle Workspace Email SecuritySecure Email Gateway Service
    Encryption
    File Encryption
    Endpoint Detection and Response (EDR)Endpoint SecurityExtended Detection and Response (XDR)Governance, Risk and Compliance (GRC) PlatformsIdentity Management
    Privileged Access Management
    Identity and Access Management (IAM)Incident ResponseInsider Risk Detection and ManagementIoT SecurityManaged Detection and Response (MDR)Managed Threat HuntingManaged Security Services Provider (MSSP)
    Penetration Testing Services (PenTest)
    Microsoft Office 365 SecurityMobile SecurityNetwork Detection and Response (NDR)Network Security
    Network Traffic Analysis (NTA)
    Password ManagementPenetration Testing (PenTest)Phishing SecurityPreference and Consent Management SolutionsPrivacy Management SolutionsPrivileged Access Management (PAM)Risk Management ToolsSaaS Security (Software as a Service)
    SaaS Security Control Plane (SSCP)
    SaaS Security Compliance
    SaaS Security Posture Management (SSPM)
    Secure Access Service Edge (SASE)Security Awareness TrainingSecurity Operations & Threat Intelligence
    Asset ManagementExpense ManagementSIEM
    Security Ratings PlatformSOC as a ServiceSocial Media Security
    Facebook SecurityInstagram SecurityLinkedIn SecurityTwitter Security
    Third Party Risk ManagementThreat Intelligence
    Brand IntelligenceCard Fraud IntelligenceGeopolitical IntelligenceIdentity IntelligenceSecOps IntelligenceThird-Party IntelligenceVulnerability Intelligence
    Vulnerability Management
    Managed Detection & Response (MDR)
    Web Application Firewall (WAF)Zero Trust Network Access (ZTNA)
  • Compliance Category
    Detect
    Security & Continuous Monitoring
    Identify
    Asset ManagementRisk ManagementSecurity & Continuous MonitoringSupply Chain Risk Management
    Protect
    Identity Management & Access ControlProtective TechnologyAwareness & Training
    Respond
    AnalysisMitigation
  • Compliance Standard
    CMMCISO 27001SOC 1SOC 2SOC 3HIPAAHITECHHITRUSTNIST
  • Home
  • Media
  • Red Team Workshop
News & Media
CYBER BUYER red team vectra workshop

Red Team Workshop

May 5th 2021
red team workshop cyber security

It’s time to place your bets and giddy up! Sharpen your threat hunting skills and earn 3.5 CPE credits at this upcoming hands-on, interactive Red Team training. Learn the skills and tactics attackers use to work their way into enterprises while gaining new insight into threat hunting techniques. Then up the ante, with open play as a Red Team attacker. Compete against your peer to see who will finish in the money! Workshops fill up quickly, so register today to secure your spot.

Attendees will meet for a working session, with a walk through of the live attacks from the morning and discover how blue teams, or the threat hunters, identify, detect and respond to advanced threats.

  • 1st prize $150 Amazon Gift Card + Threat Hunter Gift Bag
  • 2nd prize $100 Amazon Gift Card + Threat Hunter Gift Bag
  • 3rd prize $50 Amazon Gift Card + Threat Hunter Gift Bag

Participant Requirements:

  • Skill level: Basic attacking skills (i.e. Threat Hunters, Security Analysts, etc.)
  • VPN installation required
  • Completion of Prerequisite: Approximately 5 days prior to the event you will receive a Welcome Email that includes detailed instructions; you will need to complete before the workshop to participate.

Prerequisites are as follows:

  • Install VPN Client (Zerotier) and establish connection with workshop environment
  • Verify connectivity to your assigned Kali instance
  • Verify connectivity to your assigned Win10 instance
  • Register an account on the Workshop CTF Server

Receive 3.5 CPE credits and a digital certificate upon completion. The deadline to register is May 27th and is open to the first 30 participants. ‍

As this event has reached capacity in the past, please cancel by Friday, May 21st to open your spot to someone on the waitlist if you are unable to participate.




« Back to News & Media
Newsletter Sign Up

CYBER BUYER LLC trusted cybersecurity compliance
  • 7761 Ballantyne Commons Parkway, Suite 102, Charlotte, NC 28277
  • 980.729.6328
Browse By
  • Product Type
  • Compliance Category
  • Compliance Standard
Company
  • About Us
  • Our Advisors
  • Our Services
  • News & Media
  • Podcast
  • Cyber Breakfast Club
Support
  • Contact Us
  • Newsletter Sign-up
  • Privacy & Terms
  • Sitemap
© 2023 CYBER BUYER ® LLC. All Rights Reserved.
CYBER BUYER LLC trusted cybersecurity compliance
Assessment Type
Asset & Expense Management AssessmentBreach Notification Plan AssessmentBusiness Continuity Planning AssessmentCMMCCompliance AssessmentCompliance Data Center Technology Cyber Security CloudCyber Risk AssessmentCyber Security Program Development AssessmentDisaster Recovery Planning AssessmentEmail Threat AssessmentGovernance Program DevelopmentHIPAAHITECHHITRUSTISSO 27001Incident Response Plan AssessmentPolicy Review AssessmentPre Audit Readiness AssessmentPrivacy AssessmentReadiness Assessment - CMMC, SOC, HITRUST, HIPPA, HITECH, ISO 27001Regulatory Compliance Gap Assessment (GDPR, CCPA, CMMC)Security Impact AssessmentShort Tenure Time WatchSOC 1SOC 2SOC 3SOC for CybersecuritySOC for Vendor Supply ChainThird-Party Risk AssessmentVendor Risk Management Assessment
Product Type
Access ManagementActive Directory Security (AD)Antivirus
Next-Generation Antivirus (NGAV)
API SecurityApplication SecurityAssessment
Email Threat AssessmentMicrosoft 365 Security Compliance AssessmentEndpoint Security AssessmentInsider Threat Assessment
Asset Discovery & ManagementAttack Surface Management (ASM)AuditAwareness TrainingAWS MarketplaceBackup as a Service (BaaS)Bot SecurityBrand ProtectionCISO as a ServiceCollaboration Security
Slack SecurityMicrosoft Teams SecurityZoom SecuritySalesforce Chatter SecurityTelegram SecurityWeChat SecurityWhatsApp Security
Cloud Access Security Broker (CASB)Cloud Security
AWS Cloud SecurityAzure Cloud SecurityGoogle Cloud Security
Cloud VPNContinuous Controls Monitoring (CCM)Compliance
SOC 2
Consulting ServicesCyber Asset Attack Surface Management (CAASM)Data Governance SolutionsData Privacy ManagementData ProtectionDDoS ProtectionDisaster Recovery as a Service (DRaaS)Email Security
Cloud Email Security SoftwareDMARC - Domain-Based MessageEmail Anti-Spam SoftwareEmail Encryption SoftwareIntelligent Email Protection SoftwareMicrosoft Office 365 Email SecurityGoogle Workspace Email SecuritySecure Email Gateway Service
Encryption
File Encryption
Endpoint Detection and Response (EDR)Endpoint SecurityExtended Detection and Response (XDR)Governance, Risk and Compliance (GRC) PlatformsIdentity Management
Privileged Access Management
Identity and Access Management (IAM)Incident ResponseInsider Risk Detection and ManagementIoT SecurityManaged Detection and Response (MDR)Managed Threat HuntingManaged Security Services Provider (MSSP)
Penetration Testing Services (PenTest)
Microsoft Office 365 SecurityMobile SecurityNetwork Detection and Response (NDR)Network Security
Network Traffic Analysis (NTA)
Password ManagementPenetration Testing (PenTest)Phishing SecurityPreference and Consent Management SolutionsPrivacy Management SolutionsPrivileged Access Management (PAM)Risk Management ToolsSaaS Security (Software as a Service)
SaaS Security Control Plane (SSCP)
SaaS Security Compliance
SaaS Security Posture Management (SSPM)
Secure Access Service Edge (SASE)Security Awareness TrainingSecurity Operations & Threat Intelligence
Asset ManagementExpense ManagementSIEM
Security Ratings PlatformSOC as a ServiceSocial Media Security
Facebook SecurityInstagram SecurityLinkedIn SecurityTwitter Security
Third Party Risk ManagementThreat Intelligence
Brand IntelligenceCard Fraud IntelligenceGeopolitical IntelligenceIdentity IntelligenceSecOps IntelligenceThird-Party IntelligenceVulnerability Intelligence
Vulnerability Management
Managed Detection & Response (MDR)
Web Application Firewall (WAF)Zero Trust Network Access (ZTNA)
Compliance Category
Detect
Security & Continuous Monitoring
Identify
Asset ManagementRisk ManagementSecurity & Continuous MonitoringSupply Chain Risk Management
Protect
Identity Management & Access ControlProtective TechnologyAwareness & Training
Respond
AnalysisMitigation
Compliance Standard
CMMCISO 27001SOC 1SOC 2SOC 3HIPAAHITECHHITRUSTNIST

Connect with Cyber Security Leaders

The Cyber Breakfast Club™ is a Monthly Private Cyber Security Breakfast Meeting Connecting Cybersecurity Executives and Leaders.


x