Skip to content

cybertrainingrange/sprint6

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

65 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Cyber Range Team Capstone Project Summary - Sprint 6

SOC Analyst

In today's digital landscape, cybersecurity is of paramount importance to organizations across all industries. As part of our Capstone Project at The Knowledge House, our team embarked on a journey to develop a comprehensive cybersecurity training range. We aimed to provide hands-on experience in offensive and defensive security, Linux network operations, monitoring analysis, and the implementation of Security Information and Event Management (SIEM) systems. Leveraging the powerful capabilities of Amazon Web Services (AWS), we created a dynamic and immersive learning environment that enabled us to grow and develop essential cybersecurity skills.

Empowering Learners: Developing Essential Skills through Offensive and Defensive Security Techniques

The increasing frequency and complexity of cyber threats necessitate the continuous development of cybersecurity expertise. Our Capstone Project aimed to bridge the skills gap by designing a training range that would simulate real-world scenarios and enable participants to learn and apply cybersecurity concepts effectively. Through a combination of offensive and defensive security techniques, Linux network operations, monitoring analysis, and SIEM implementation, we sought to equip learners with the necessary skills to protect critical systems and data.

Offensive Security

Offensive Security

To develop a holistic understanding of cybersecurity, we delved into offensive security practices. Ethical hacking and penetration testing methodologies allowed us to identify vulnerabilities in systems, networks, and applications. By emulating real-world attacks and exploiting potential weaknesses, we gained valuable insights into the mindset and techniques employed by malicious actors. Armed with this knowledge, we devised strategies to strengthen the defensive posture of our simulated environments.

Defensive Security

Defensive Security

Building on our offensive security knowledge, we explored defensive security practices. We focused on implementing robust security controls and technologies to protect against unauthorized access, data breaches, and system disruptions. Our team utilized access controls, firewalls, intrusion detection and prevention systems, and encryption mechanisms to safeguard our systems and data. We also developed incident response plans to ensure swift and effective action in the event of a security incident.

Linux Network Operations

Linux Network Operations:

Understanding Linux network operations was essential to managing and securing our training range's networking infrastructure. We gained expertise in configuring network interfaces, managing IP addresses, implementing routing tables, and deploying firewalls. This knowledge enabled us to create a reliable and resilient network environment while ensuring that communication channels were adequately protected against potential threats.

Monitoring Analysis

Monitoring Analysis

Continuous monitoring and analysis were key components of our cybersecurity training range. We collected and analyzed data from various sources, such as system logs, network traffic, and security event logs, to detect potential security incidents and performance issues. By employing effective monitoring tools, we were able to proactively identify anomalies and swiftly respond to security breaches. This approach enhanced the overall security and availability of our systems.

App Screenshot

SIEM Implementation

To streamline security event management, we integrated a SIEM solution into our training range. This centralized platform allowed us to collect, store, and analyze security event data from diverse sources. The SIEM system correlated and contextualized this information, providing real-time insights into potential security threats. We gained hands-on experience in configuring and fine-tuning the SIEM to meet our specific training objectives, empowering us to make informed decisions based on the analysis of security events.

In Conclusion

Our Capstone Project at The Knowledge House provided an invaluable opportunity to enhance our cybersecurity skills through practical application. By simulating real-world scenarios and leveraging the capabilities of AWS, we developed a comprehensive cybersecurity training range. The project enabled us to grow as professionals, gaining proficiency in offensive and defensive security, Linux network operations, monitoring analysis, and SIEM implementation. Equipped with this knowledge, we are prepared to contribute to the evolving field of cybersecurity and help organizations secure their digital assets.

Technical Documentation 🛠

Summary

Technical Documentation

Agile Framework ⚓

Trello Schedule 1

Trello Schedule 2

Team A Members 👩‍💻|👨‍💻

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •