This advanced program is intended for experienced cybersecurity professionals with a strong foundation in Red Team and Blue Team methodologies, penetration testing, and investigative techniques. Participants will elevate their expertise by actively engaging in both offensive and defensive operations within a complex, scenario-driven environment.

In this immersive, hands-on experience, a fictitious organization is in crisis after a cyberattack renders its primary infrastructure unusable. Participants are challenged to regain access through existing backdoors while bypassing security restrictions. From there, they will analyze log data to reconstruct the attack timeline and ultimately restore critical organizational data.
Throughout the course, participants will work across both Linux and Windows environments, leveraging Splunk and a variety of additional tools, as well as conducting open-source research to support their investigations.
In this immersive, hands-on experience, a fictitious organization is in crisis after a cyberattack renders its primary infrastructure unusable. Participants are challenged to regain access through existing backdoors while bypassing security restrictions. From there, they will analyze log data to reconstruct the attack timeline and ultimately restore critical organizational data.
Throughout the course, participants will work across both Linux and Windows environments, leveraging Splunk and a variety of additional tools, as well as conducting open-source research to support their investigations.
• Experienced Penetration testers/ CEH
• Experienced SOC Analysts
• Experienced Enthusiasts
• Discovery
• Reconnaissance
• Initial Access
• Persistence
• Defense Evasion
• Malware Analysis
• Threat Intelligence
• Network Analysis
• File Analysis
Success in this action-packed experience requires analytical thinking, creativity, and an ability to approach problems from unconventional perspectives.
• Experienced Penetration testers/ CEH
• Experienced SOC Analysts
• Experienced Enthusiasts
• Experienced cybersecurity professionals with a strong foundation in Red Team and Blue Team methodologies, penetration testing, and investigative techniques.
Workstation Requirements
• Google Chrome browser with Remote Desktop Protocol (RDP) support
• Supported operating systems: Windows, Linux, or macOS
• Chromebooks, tablets, and mobile phones are not supported
• Participants using systems with restrictive security configurations (e.g., Endpoint Detection and Response [EDR] solutions) are advised to temporarily disable these features, as they may interfere with lab activities
• When possible, participants are encouraged to use personal laptops to avoid organizational security restrictions
If format is ONLINE Network Requirements
• A minimum of 3 Mbps of internet bandwidth per participant
• No firewall restrictions that block required ports or IP addresses
• Preferred network access configuration:
• Whitelist *.cywaria.net/ and ensure access to port 8443
• An unrestricted internet connection with no port or IP filtering is idea
• lIf feasible, participants are encouraged to bring or use personal mobile hotspots