Blogg

/Blogg/
18 10, 2018

New Videos – Blue Team Training Toolkit (BT3) Video Series

By |2018-10-18T14:50:50+00:00oktober 18th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for New Videos – Blue Team Training Toolkit (BT3) Video Series

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.Blue Team Training Toolkit Video Series have [...]

10 10, 2018

How to Get Started with Mocksum

By |2018-09-04T14:45:19+00:00oktober 10th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for How to Get Started with Mocksum

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. BT3 includes Mocksum, which is a module that allow you to simulate and plant realistic artifacts during training sessions, incident response drills or red [...]

3 10, 2018

How to Create a Network Diversion with Pcapteller

By |2018-09-04T14:44:56+00:00oktober 3rd, 2018|Categories: Blue Team Training Toolkit (BT3), Pcapteller|Kommentarer er skrudd av for How to Create a Network Diversion with Pcapteller

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. BT3 includes Pcapteller, which is a module designed for network traffic manipulation and replay. It allows organizations to re-create a recorded network traffic scenario [...]

26 09, 2018

How Pcapteller can be Used During a Training Session

By |2018-09-04T14:43:47+00:00september 26th, 2018|Categories: Blue Team Training Toolkit (BT3), Pcapteller|Kommentarer er skrudd av for How Pcapteller can be Used During a Training Session

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level.BT3 includes Pcapteller, which is a module designed for network traffic manipulation and replay. It allows organizations to re-create a recorded network traffic scenario that [...]

19 09, 2018

How to Get Started with Pcapteller

By |2018-09-04T14:42:14+00:00september 19th, 2018|Categories: Blue Team Training Toolkit (BT3), Pcapteller|Kommentarer er skrudd av for How to Get Started with Pcapteller

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. BT3 includes Pcapteller, which is a module designed for network traffic manipulation and replay. It allows organizations to re-create a recorded network traffic scenario [...]

12 09, 2018

Simulating a Targeted Attack with Maligno

By |2018-09-04T14:41:32+00:00september 12th, 2018|Categories: Blue Team Training Toolkit (BT3), Maligno|Kommentarer er skrudd av for Simulating a Targeted Attack with Maligno

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level.BT3 includes the module Maligno, which allows you to simulate malware infections or targeted attacks with specific C&C communications in a safe manner.This blog post [...]

4 09, 2018

New Release – Blue Team Training Toolkit v2.8

By |2018-09-04T16:24:34+00:00september 4th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for New Release – Blue Team Training Toolkit v2.8

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Maintenance ReleaseBlue Team Training Toolkit [...]

29 08, 2018

How to Get Started with Maligno

By |2018-08-30T12:18:10+00:00august 29th, 2018|Categories: Blue Team Training Toolkit (BT3), Maligno|Kommentarer er skrudd av for How to Get Started with Maligno

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level.BT3 includes the module Maligno, which allows you to simulate malware infections or targeted attacks with specific C&C communications in a safe manner.This blog post [...]

22 08, 2018

Introduction to Maligno – Designed for Attack Simulations

By |2018-08-08T09:46:46+00:00august 22nd, 2018|Categories: Blue Team Training Toolkit (BT3), Maligno|Kommentarer er skrudd av for Introduction to Maligno – Designed for Attack Simulations

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.This blog post is going to cover [...]

15 08, 2018

How to Get Access to Free and Premium Training Material

By |2018-08-15T17:07:47+00:00august 15th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for How to Get Access to Free and Premium Training Material

Blue Team Training Toolkit (BT3) is software for defensive security training. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.Blue Team Training Toolkit also offers an optional content subscription via an online API. By creating a free BT3 subscription account, you get access to the [...]