top of page
the_collective_logo_banner.png

the_collective is a program designed to help introduce underrepresented people to the exciting world of cybersecurity. Through this hands-on learning experience, beginners or "newbies" are exposed to fundamentals that map directly to career pathways such as a pentester, network security engineer, security analyst, and many other cybersecurity careers with annual salaries ranging from $60,000 - $140,000 with no college degree required.

Throughout the program, our experts teach cybersecurity fundamentals of how to protect IT systems from cyberattacks. In each session of this series, students will examine a scenario from both the Red Team and Blue Team perspectives. First, you learn how to perform an exploit, then you learn how to apply the preventative measures to prevent that exploit from happening. At the end of the class, students will decide for themselves whether they want to be on the Red Team or the Blue Team. After students successfully complete the Red Team / Blue Team Fundamentals class they can move on to more advanced concepts and pursue certifications and potential job placement assistance.

Red Team vs. Blue Team

Both red teams and blue teams work toward improving an organization's security, but they do so differently. A red team plays the role of the attacker by trying to find vulnerabilities and breakthrough cybersecurity defenses. A blue team defends against attacks and responds to incidents when they occur.

Red and blue teams are more than just Halo references and army techniques. In fact, these teams play an important role in defending against advanced cyber attacks that threaten business communications, sensitive client data, or trade secrets.

Red teams are offensive security professionals who are experts in attacking systems and breaking into defenses. Blue teams are defensive security professionals responsible for maintaining internal network defenses against all cyber-attacks and threats. Red teams simulate attacks against blue teams to test the effectiveness of the network’s security. These red and blue team exercises provide a holistic security solution ensuring strong defenses while keeping in view evolving threats.

Syllubus
  • Introduction to Red Team and Blue Team Fundamentals

  • Protocols and Ports Used for Exploits

  • IP Addressing Concepts

  • Red Team - Introduction to Kali Linux

  • Blue Team - Server Operating System Basics

  • Red Team - Wireshark Essentials

  • Blue Team - Network Monitoring Tools in Server Operating Systems

  • Red Team - Nmap Network Scanning Techniques

  • Blue Team - Server Firewall Configuration

  • Red Team - Man in the Middle Exploits

  • Blue Team - Malware protection and Antivirus protection

  • Red Team - Introduction to Metasploit

  • Blue Team - Patch Management and Software Updates

  • Red Team - Credential Harvesting Tools

  • Blue Team - Securing Servers with Policies

  • Initiate a Denial of Service Attack on a Server

  • Exploiting Telnet Vulnerabilities

  • SMB Exploit with Responder

  • Performing a Brute Force Password Attack

  • Exploit Windows with Metasploit (Eternal Blue)

  • Introduction to Cyber Ranges

bottom of page