Think Like an Attacker: Vectra AI Blue Team Workshops

In this era of advanced high-speed hybrid and multi-cloud attacks, relying solely on talented SOC experts is no longer enough. Vectra’s Attack Signal Intelligence equips your security team to get ahead and stay ahead of the attackers.

Learn how to detect, think and move at the speed of attackers by joining our interactive, hands-on Blue Team Workshops — each with a different challenge — where you’ll master the art of threat hunting, investigation and response.

Polish and perfect your defense skills, guided by our experts, to protect your infrastructure and earn CPE credits in an adventurous, self-paced yet fully supported format. Attacks happen fast, but you can be faster!

Don’t wait – join us for these interactive experiences and walk away with new expertise for faster, more accurate threat hunting, investigation and response.

Blue Team Workshop:

Prevent Hybrid Network Attacks

Know when your hybrid network is compromised

Know when your hybrid network is compromised

Analyze post compromise behavior-based indicators without signature matching
Launch deeper attack investigations to stop attacks from becoming breaches
Get hands-on experience utilizing Vectra AI’s network detection and response solution and 3rd party threat investigation tools
Earn 3 hours of CPE credit upon completion of the entire challenge
Blue Team Workshop:

Prevent AWS Cloud Attacks

Detect, prioritize, investigate and respond to attacks targeting your AWS environments.

Detect, prioritize, investigate and respond to attacks targeting your AWS environments

Detect and investigate a real-world scenario based on the mishandling of AWS IAM credentials
Track the attacker’s journey by exploring and creating a backdoor to an AWS account
Explore the AWS Lambda control plane, features and integration with AWS EventBridge, AWS EC2 and S3
Earn 1.5 hours of CPE credit upon completion of the entire challenge
Blue Team Workshop:

Microsoft Attack – Detect M365 + Azure AD Attacks

Get ahead and stay ahead of attackers targeting M365 + Azure AD applications

Get ahead and stay ahead of attackers targeting M365 + Azure AD applications

Increase threat visibility beyond native M365 controls with alert support and coverage for a clear understanding of attacker behavior & techniques used to infiltrate Azure AD & M365 applications and data including Sharepoint, OneDrive, Exchange, and Teams
Uncover unseen attacker activities correlated across applications and Azure AD in every region, depicting the full attack cycle with clear context
Expose compromised user accounts without complexity by observing activity from high-risk admin accounts to detect and prioritize when critical threats to the organization emerge
Earn 1.5 hours of CPE credit upon completion of the entire challenge
The Team

Meet your Blue Team Challenges guides

System Engineer Team

Register Now