Cybersecurity

Rooms

Fields

Red Teaming

Use diverse techniques for initial access
Enumerate and persist on targets
Evade security solutions
Exploit Active Directory

Blue Teaming

Detect threats
Gather threat actor intelligence
Understand and emulate adversary TTPs
Identify and respond to incidents

Security Analyst

Monitor and investigate alerts
Configure and manage security tools
Develop and implement IDS signatures
Escalate the security incidents to the higher team if needed​