Logs of numerous tools put a great burden on cybersecurity specialists. At the workshop, you will look into ways to solve this problem: how to detect a rare event or an anomaly using machine learning tools and metric approaches
Access to a test CI/CD infrastructure
Access to the workshop application
Pivoting as a set of techniques that enable an attacker to gain access to private network segments, using compromised machines as intermediate nodes. The workshop will explore some of such techniques
VirtualBox or VMware
Virtual machines for practical exercises