Hands-on Simulation of Cyber Attacks in the Cyber Rangers Lab | Cyber Rangers

services

Training sessions

Hands-on Simulation of Cyber Attacks in the Cyber Rangers Lab

This practical course offers participants a unique opportunity to experience a real-life cyberattack simulation in a secure lab environment. The lab consists of Windows servers and workstations that are part of an Active Directory domain, an OT environment simulating industrial control systems, and Linux servers. Participants will be guided step-by-step through the stages of a cyberattack – from reconnaissance and privilege escalation to data exfiltration – with a focus on the techniques used by Red Teams in practice. The course combines theoretical foundations with hands-on exercises, making it ideal for professionals seeking to deepen their knowledge of cybersecurity and acquire practical skills in attack simulation.

This course is ideal for both technical specialists and security managers who wish to better understand the workings of cyberattacks and improve the security of their IT and OT environments.

The training is available in both Czech and English.

SOC Analysts, Incident Responders, Forensic Investigators, IT Technicians
It will be offered based on the participants' interest
20
24 hours in 3 days
Prague
36 000,- Kč excl. VAT

Course Modules:

  1. Introduction to Cyber Attacks and Red Teaming

    • Overview of cyber threats and attack techniques.
    • Red Team structure and its role in security operations.
    • Goals and ethics of simulated attacks.
  2. Reconnaissance – Exploring the Target Infrastructure

    • Passive and active reconnaissance methods (network scanning, OSINT).
    • Identifying vulnerabilities in the network and domain infrastructure.
    • Gaining access and mapping critical elements of the OT environment.
  3. Initial Access – Gaining Entry

    • Exploiting weak passwords and service vulnerabilities.
    • Phishing and social engineering as attack vectors.
    • Active Directory attacks (ASREPRoasting, Kerberoasting).
  4. Privilege Escalation

    • Escalation techniques in Windows environments (token stealing, UAC bypass).
    • Privilege escalation specifics in Linux systems.
    • Exploiting vulnerabilities in OT environments.
  5. Lateral Movement

    • Techniques for spreading access within the domain environment.
    • Using RDP, SMB, WMI, PSExec, and other tools.
    • Pivoting techniques between Windows and Linux systems.
  6. Persistence – Maintaining Access

    • Techniques for hidden and long-term access (scheduled tasks, registry persistence).
    • Backdoors and rootkits in both Windows and Linux environments.
    • Maintaining control over compromised OT systems.
  7. Command and Control (C2)

    • Setting up and managing a C2 infrastructure.
    • Protocols and techniques for communication with compromised systems (DNS, HTTPS, covert channels).
    • Detection and defense against C2 activities.
  8. Data Exfiltration

    • Methods for exfiltrating data from the environment (FTP, HTTP/S, cloud services).
    • Concealing exfiltration from security tools.
    • Specifics of exfiltrating sensitive data from OT systems.
  9. Forensic Analysis and Incident Response

    • Identifying indicators of compromise (IOCs).
    • Log and network activity analysis.
    • Responding to cyberattacks and measures to minimize damage.
  10. Final Attack – Comprehensive Cyberattack Simulation

    • Teamwork on a simulated attack on the target infrastructure.
    • Applying techniques from individual modules in a single scenario.
    • Final discussion and evaluation of the attack from both attacker and defender perspectives.