Blogg

/Blogg/
29 08, 2018

How to Get Started with Maligno

By |2018-08-30T12:18:10+00:00august 29th, 2018|Categories: Blue Team Training Toolkit (BT3), Maligno|Kommentarer er skrudd av for How to Get Started with Maligno

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level.BT3 includes the module Maligno, which allows you to simulate malware infections or targeted attacks with specific C&C communications in a safe manner.This blog post [...]

22 08, 2018

Introduction to Maligno – Designed for Attack Simulations

By |2018-08-08T09:46:46+00:00august 22nd, 2018|Categories: Blue Team Training Toolkit (BT3), Maligno|Kommentarer er skrudd av for Introduction to Maligno – Designed for Attack Simulations

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.This blog post is going to cover [...]

15 08, 2018

How to Get Access to Free and Premium Training Material

By |2018-08-15T17:07:47+00:00august 15th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for How to Get Access to Free and Premium Training Material

Blue Team Training Toolkit (BT3) is software for defensive security training. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.Blue Team Training Toolkit also offers an optional content subscription via an online API. By creating a free BT3 subscription account, you get access to the [...]

8 08, 2018

How to Manage a BT3 API Subscription Account

By |2018-08-15T17:13:29+00:00august 8th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for How to Manage a BT3 API Subscription Account

Blue Team Training Toolkit (BT3) is software for defensive security training. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.Blue Team Training Toolkit also offers an optional content subscription via an online API, which includes realistic network traffic related to a wide range of network [...]

1 08, 2018

How to Create a BT3 API Subscription Account

By |2018-08-01T17:40:44+00:00august 1st, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for How to Create a BT3 API Subscription Account

Blue Team Training Toolkit (BT3) is software for defensive security training. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.Blue Team Training Toolkit also offers an optional content subscription via an online API, which includes realistic network traffic related to a wide range of network [...]

26 07, 2018

The Most Relevant Commands Supported by BT3

By |2018-07-26T08:59:22+00:00juli 26th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for The Most Relevant Commands Supported by BT3

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.To ensure usability from the first moment, [...]

19 07, 2018

How to Get Started with Blue Team Training Toolkit

By |2018-07-19T10:53:19+00:00juli 19th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for How to Get Started with Blue Team Training Toolkit

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.This blog post is going to cover [...]

16 07, 2018

Discover the Benefits of Blue Team Training Toolkit

By |2018-07-16T15:58:51+00:00juli 16th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for Discover the Benefits of Blue Team Training Toolkit

Until the past decade, common threats against computer systems could be stopped by anti-virus software and firewalls. Nowadays, these two countermeasures can be easily bypassed by attackers, and they just offer a basic degree of protection. Moreover, IT personnel are required to have specialized skills within network analysis and incident response in order to [...]

16 05, 2018

New Release – Blue Team Training Toolkit v2.7

By |2018-05-16T15:11:35+00:00mai 16th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for New Release – Blue Team Training Toolkit v2.7

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Maintenance ReleaseBlue Team Training Toolkit [...]

13 04, 2018

New Release – Mobile Application Security Verification Standard (MASVS) v1.0

By |2018-04-13T15:57:36+00:00april 13th, 2018|Categories: guides|Kommentarer er skrudd av for New Release – Mobile Application Security Verification Standard (MASVS) v1.0

The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, their goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.The project recently published the OWASP [...]