Blogg

/Blogg/
22 08, 2018

Introduction to Maligno – Designed for Attack Simulations

By |2018-08-08T09:46:46+00:00august 22nd, 2018|Categories: Blue Team Training Toolkit (BT3), Maligno|Kommentarer er skrudd av for Introduction to Maligno – Designed for Attack Simulations

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.This blog post is going to cover [...]

15 08, 2018

How to Get Access to Free and Premium Training Material

By |2018-08-15T17:07:47+00:00august 15th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for How to Get Access to Free and Premium Training Material

Blue Team Training Toolkit (BT3) is software for defensive security training. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.Blue Team Training Toolkit also offers an optional content subscription via an online API. By creating a free BT3 subscription account, you get access to the [...]

8 08, 2018

How to Manage a BT3 API Subscription Account

By |2018-08-15T17:13:29+00:00august 8th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for How to Manage a BT3 API Subscription Account

Blue Team Training Toolkit (BT3) is software for defensive security training. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.Blue Team Training Toolkit also offers an optional content subscription via an online API, which includes realistic network traffic related to a wide range of network [...]

1 08, 2018

How to Create a BT3 API Subscription Account

By |2018-08-01T17:40:44+00:00august 1st, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for How to Create a BT3 API Subscription Account

Blue Team Training Toolkit (BT3) is software for defensive security training. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.Blue Team Training Toolkit also offers an optional content subscription via an online API, which includes realistic network traffic related to a wide range of network [...]

26 07, 2018

The Most Relevant Commands Supported by BT3

By |2018-07-26T08:59:22+00:00juli 26th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for The Most Relevant Commands Supported by BT3

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.To ensure usability from the first moment, [...]

19 07, 2018

How to Get Started with Blue Team Training Toolkit

By |2018-07-19T10:53:19+00:00juli 19th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for How to Get Started with Blue Team Training Toolkit

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.This blog post is going to cover [...]

16 07, 2018

Discover the Benefits of Blue Team Training Toolkit

By |2018-07-16T15:58:51+00:00juli 16th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for Discover the Benefits of Blue Team Training Toolkit

Until the past decade, common threats against computer systems could be stopped by anti-virus software and firewalls. Nowadays, these two countermeasures can be easily bypassed by attackers, and they just offer a basic degree of protection. Moreover, IT personnel are required to have specialized skills within network analysis and incident response in order to [...]

16 05, 2018

New Release – Blue Team Training Toolkit v2.7

By |2018-05-16T15:11:35+00:00mai 16th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for New Release – Blue Team Training Toolkit v2.7

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Maintenance ReleaseBlue Team Training Toolkit [...]

13 04, 2018

New Release – Mobile Application Security Verification Standard (MASVS) v1.0

By |2018-04-13T15:57:36+00:00april 13th, 2018|Categories: guides|Kommentarer er skrudd av for New Release – Mobile Application Security Verification Standard (MASVS) v1.0

The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, their goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.The project recently published the OWASP [...]

9 02, 2018

Open Application – IT Security Consultant / Penetration Tester

By |2018-04-08T12:19:27+00:00februar 9th, 2018|Categories: jobs|Kommentarer er skrudd av for Open Application – IT Security Consultant / Penetration Tester

Encripto does not currently have open positions, but we are always interested in people who are reliable, thorough, creative, analytic and share our passion for IT security. Do you meet the requirements listed below? About Encripto Encripto AS provides specialized, high quality, information security services. Since 2010, Encripto has been chosen [...]