16 05, 2018

New Release – Blue Team Training Toolkit v2.7

By |2018-09-04T14:52:12+02:00May 16th, 2018|Categories: Blue Team Training Toolkit (BT3)|Comments Off on New Release – Blue Team Training Toolkit v2.7

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Maintenance ReleaseBlue Team Training Toolkit [...]

30 01, 2018

Blue Team Training Toolkit v2.6 is available for download!

By |2018-01-30T15:47:49+02:00January 30th, 2018|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Blue Team Training Toolkit v2.6 is available for download!

Blue Team Training Toolkit (BT3) is designed for network analysis training sessions, incident response drills and red team engagements. Based on adversary replication techniques, and with reusability in mind, Blue Team Training Toolkit allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. New Release [...]

18 09, 2017

Blue Team Training Toolkit v2.5 has been released

By |2017-09-18T15:17:57+02:00September 18th, 2017|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Blue Team Training Toolkit v2.5 has been released

Blue Team Training Toolkit (BT3) is designed for network analysis training sessions, incident response drills and red team engagements. Based on adversary replication techniques, and with reusability in mind, Blue Team Training Toolkit allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Maintenance Release [...]

4 09, 2017

New Release – Blue Team Training Toolkit v2.4

By |2018-05-16T15:05:54+02:00September 4th, 2017|Categories: Blue Team Training Toolkit (BT3)|Comments Off on New Release – Blue Team Training Toolkit v2.4

Blue Team Training Toolkit (BT3) is designed for network analysis training sessions, incident response drills and red team engagements. Based on adversary replication techniques, and with reusability in mind, Blue Team Training Toolkit allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. BT3 v2.4 [...]

17 07, 2017

New Release – Blue Team Training Toolkit v2.3!

By |2018-05-16T15:06:37+02:00July 17th, 2017|Categories: Blue Team Training Toolkit (BT3), Maligno, Pcapteller, tools|Comments Off on New Release – Blue Team Training Toolkit v2.3!

Blue Team Training Toolkit (BT3) introduces improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. BT3 v2.3 - New Features Blue Team Training Toolkit [...]

22 04, 2017

Blue Team Training Toolkit v2.2 has been released!

By |2017-04-22T21:12:17+02:00April 22nd, 2017|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Blue Team Training Toolkit v2.2 has been released!

Blue Team Training Toolkit (BT3) introduces improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. New Release - Better Usability Blue Team Training [...]

7 03, 2017

Blue Team Training Toolkit v2.1.1 has been released!

By |2017-03-07T21:53:51+02:00March 7th, 2017|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Blue Team Training Toolkit v2.1.1 has been released!

Blue Team Training Toolkit (BT3) introduces improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Maintenance ReleaseBlue Team Training Toolkit version 2.1.1 includes bug [...]

22 11, 2016

Blue Team Training Toolkit v2.1 has been released!

By |2017-04-22T21:18:50+02:00November 22nd, 2016|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Blue Team Training Toolkit v2.1 has been released!

Blue Team Training Toolkit (BT3) introduces improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Mocksum - New Module This version includes Mocksum, [...]

21 08, 2016

Network Defense Training Dilemmas

By |2017-01-31T16:08:39+02:00August 21st, 2016|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Network Defense Training Dilemmas

In our previous blog post, we looked at the most important constraints related to computer network defense training. These constrains were mainly related to the criteria difficulty of implementation, cost, risk and realism.Typically, these criteria tend to present themselves with important dilemmas. Which in turn force organizations to prioritize one criterion over others. Or [...]

12 08, 2016

What Makes Network Defense Training so Challenging

By |2017-01-31T19:02:26+02:00August 12th, 2016|Categories: Blue Team Training Toolkit (BT3)|Comments Off on What Makes Network Defense Training so Challenging

In an attempt to introduce improvements in current computer network defense analysis training, Encripto has recently released the Blue Team Training Toolkit. Computer network defense analysis is a broad topic and skills can be acquired with different methods. Common training techniques are based on studying network traffic that could be either live or previously [...]

Go to Top