Blue Team Training Toolkit (BT3)

21 08, 2016

Network Defense Training Dilemmas

By |2017-01-31T16:08:49+02:00august 21st, 2016|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for Network Defense Training Dilemmas

In our previous blog post, we looked at the most important constraints related to computer network defense training. These constrains were mainly related to the criteria difficulty of implementation, cost, risk and realism.Typically, these criteria tend to present themselves with important dilemmas. Which in turn force organizations to prioritize one criterion over others. Or [...]

12 08, 2016

What Makes Network Defense Training so Challenging

By |2017-01-31T19:06:58+02:00august 12th, 2016|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for What Makes Network Defense Training so Challenging

In an attempt to introduce improvements in current computer network defense analysis training, Encripto has recently released the Blue Team Training Toolkit. Computer network defense analysis is a broad topic and skills can be acquired with different methods. Common training techniques are based on studying network traffic that could be either live or previously [...]

11 07, 2016

Blue Team Training Toolkit (BT3) Video Series

By |2017-01-31T19:22:40+02:00juli 11th, 2016|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for Blue Team Training Toolkit (BT3) Video Series

Blue Team Training Toolkit (BT3) version 1.1 is now released with documentation updates and minor adjustments. We have also made a brand new BT3 video series. Blue Team Training Toolkit is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 [...]

26 06, 2016

Blue Team Training Toolkit Released

By |2017-01-31T19:28:37+02:00juni 26th, 2016|Categories: Blue Team Training Toolkit (BT3), tools|Kommentarer er skrudd av for Blue Team Training Toolkit Released

Encripto has released the Blue Team Training Toolkit (BT3). Until the past decade, common threats against computer systems could be stopped by anti-virus software and firewalls. Nowadays, these two countermeasures can be easily bypassed by attackers, and they just offer a basic degree of protection. Moreover, IT personnel are required to have specialized skills [...]

Go to Top