Products + All Products + Software Integrity + Semiconductor IP + Verification + Design + Silicon Engineering
Posted by Synopsys Editorial Team on January 20, 2017
Most developers focus their day-to-day thought processes on building software rather than breaking it. Meanwhile, organizations face growing and evolving threats against their digital assets and infrastructure. That’s why it’s critically important for security operations and development teams to think defensively. Thinking of any and every possible attack is what red teaming is all about.
A red team assessment is a goal-based adversarial activity requiring a big-picture, holistic view of the organization–from the perspective of an adversary. It allows organizations to gain insight into how their security posture holds up when faced with a real threat.
This workshop offers a hands-on, two-day course introducing attendees to the concepts of red teaming and how it is different than traditional vulnerability testing. During the workshop, you’ll be introduced to the physical, social, and electronic testing methods to utilize during red team engagements. You’ll walk away with guidance for your organization to create and maintain an internal red team.
Successful completion of the workshop provides attendees with:
The traditional classroom delivery format is relevant for both management and IS security teams, and can be delivered in one-day or two-day formats.