Home
>
Courses
>
Purple team (Challenge) Intermediate/Advanced
Course

Purple team (Challenge) Intermediate/Advanced

This advanced program is intended for experienced cybersecurity professionals with a strong foundation in Red Team and Blue Team methodologies, penetration testing, and investigative techniques. Participants will elevate their expertise by actively engaging in both offensive and defensive operations within a complex, scenario-driven environment.

Hour Course Icon
Hours
6 Academic Hours
Format Course Icon
Format
Online/On-site
depends on the client's needs
Duration Course Icon
Duration
1 day

LIVE, instructor-led training

In this immersive, hands-on experience, a fictitious organization is in crisis after a cyberattack renders its primary infrastructure unusable. Participants are challenged to regain access through existing backdoors while bypassing security restrictions. From there, they will analyze log data to reconstruct the attack timeline and ultimately restore critical organizational data.

Throughout the course, participants will work across both Linux and Windows environments, leveraging Splunk and a variety of additional tools, as well as conducting open-source research to support their investigations.

In this immersive, hands-on experience, a fictitious organization is in crisis after a cyberattack renders its primary infrastructure unusable. Participants are challenged to regain access through existing backdoors while bypassing security restrictions. From there, they will analyze log data to reconstruct the attack timeline and ultimately restore critical organizational data.

Throughout the course, participants will work across both Linux and Windows environments, leveraging Splunk and a variety of additional tools, as well as conducting open-source research to support their investigations.

Learning Outcomes

Experienced Penetration testers/ CEH

Experienced SOC Analysts

Experienced Enthusiasts

Key Topics Covered

Discovery

Reconnaissance

Initial Access

Persistence

Defense Evasion

Malware Analysis

Threat Intelligence

Network Analysis

File Analysis

Success in this action-packed experience requires analytical thinking, creativity, and an ability to approach problems from unconventional perspectives.

Target Audience

Experienced Penetration testers/ CEH

Experienced SOC Analysts

Experienced Enthusiasts

Required Prior Knowledge

Experienced cybersecurity professionals with a strong foundation in Red Team and Blue Team methodologies, penetration testing, and investigative techniques.

Technical Requirements

Workstation Requirements

Google Chrome browser with Remote Desktop Protocol (RDP) support

Supported operating systems: Windows, Linux, or macOS

Chromebooks, tablets, and mobile phones are not supported

Participants using systems with restrictive security configurations (e.g., Endpoint Detection and Response [EDR] solutions) are advised to temporarily disable these features, as they may interfere with lab activities

When possible, participants are encouraged to use personal laptops to avoid organizational security restrictions

If format is ONLINE Network Requirements

A minimum of 3 Mbps of internet bandwidth per participant

No firewall restrictions that block required ports or IP addresses

Preferred network access configuration:

  • Whitelist *.cywaria.net/ and ensure access to port 8443

  • An unrestricted internet connection with no port or IP filtering is idea

  • lIf feasible, participants are encouraged to bring or use personal mobile hotspots

Computing Requirements

Enroll
Arrow Icon

$ 999

* Special Launch Pricing - Act Fast
Enroll