{"componentChunkName":"component---src-templates-post-js","path":"/blog/living-our-mission-blog-series-3-new-learning-curriculum-in-project-ares-3-6-4/","result":{"data":{"wordpressPost":{"title":"Living our Mission Blog Series #3: New Learning Curriculum in Project Ares 3.6.4","content":"<p><span style=\"color: #000000;\">We’ve made several new updates to our gamified cyber learning platform Project Ares. We are releasing new battle room and mission cyber security exercises for professionals to continue training and honing skills and competency and have optimized some aspects of performance to make the learning experience smoother.</span></p>\n<h2><span style=\"color: #000000;\"><strong>New Missions and Battle Rooms</strong></span></h2>\n<p><span style=\"color: #000000;\">To ensure professionals have access to the latest threats to train against, we develop new missions and battle rooms for our users so they can continually learn new cyber security skills, both technical and professional. The following new missions are available to users of the Professional and Enterprise licenses of Project Ares; while the new battle rooms updates are available to users of the Academy, Professional, and Enterprise licenses of Project Ares.</span></p>\n<h2><span style=\"color: #000000;\"><strong>Mission 5 – Operation Wounded Bear </strong></span></h2>\n<p><span style=\"color: #000000;\">Designed to feature cyber security protection for <strong>financial institutions</strong>, the learning objectives for this mission are to identify and remove malware responsible for identity theft and protect the network from further infections. Variability in play within the mission includes method of exfiltration, malicious DNS and IP addresses, infected machines, data collection with file share uploads that vary, method of payload and persistence, and a mix of Windows and Linux.</span></p>\n<p><span style=\"color: #000000;\">This mission provides practical application of the following skill sets:</span></p>\n<ul>\n<li><span style=\"color: #000000;\">Computer languages</span></li>\n<li><span style=\"color: #000000;\">Computer network defense</span></li>\n<li><span style=\"color: #000000;\">Information systems</span></li>\n<li><span style=\"color: #000000;\">Information security</span></li>\n<li><span style=\"color: #000000;\">Command line interface</span></li>\n<li><span style=\"color: #000000;\">Cyber defense analysis</span></li>\n<li><span style=\"color: #000000;\">Network and O/S hardening techniques</span></li>\n<li><span style=\"color: #000000;\">Signature development, implementation and impact</span></li>\n<li><span style=\"color: #000000;\">Incident response</span></li>\n</ul>\n<p><span style=\"color: #000000;\"><u>Mission Objectives: </u></span></p>\n<ol>\n<li><span style=\"color: #000000;\">Use IDS/IPS to alert on initial malware infection vectors</span></li>\n<li><span style=\"color: #000000;\">Alert/prevent download of malicious executables</span></li>\n<li><span style=\"color: #000000;\">Create alert for infections</span></li>\n<li><span style=\"color: #000000;\">Kill malware processes and remove malware from the initially infected machine</span></li>\n<li><span style=\"color: #000000;\">Kill other instances of malware processes and remove from machines</span></li>\n<li><span style=\"color: #000000;\">Prevent further infection</span></li>\n</ol>\n<h2><span style=\"color: #000000;\"><strong>Mission 6 – Operation Angry Tiger </strong></span></h2>\n<p><span style=\"color: #000000;\">Using threat vectors similar to the Saudi Arabia Aramco and Doha RasGas cyber attacks, this mission is about responding to <strong>phishing and exfiltration attacks</strong>.  Cyber defenders conduct a risk assessment of a company’s existing network structure and its cyber risk posture for possible phishing attacks. Tasks include reviewing all detectable weaknesses to ensure no malicious activity is occurring on the network currently. Variability in play within the mission includes the method of phishing in email and payload injection, the alert generated, the persistence location and lateral movement specifics, and the malicious DNS and IP addresses.</span></p>\n<p><span style=\"color: #000000;\"><u>Core competencies used in the mission: </u></span></p>\n<ul>\n<li><span style=\"color: #000000;\">Incident response team processes</span></li>\n<li><span style=\"color: #000000;\">Windows and *nix systems administration (Active Directory, Group Policy, Email)</span></li>\n<li><span style=\"color: #000000;\">Network monitoring (Snort, Bro, Sguil)</span></li>\n</ul>\n<p><span style=\"color: #000000;\"><u>Mission Objectives: </u></span></p>\n<ol>\n<li><span style=\"color: #000000;\">Verify network monitoring tools are functioning</span></li>\n<li><span style=\"color: #000000;\">Examine current email policies for risk</span></li>\n<li><span style=\"color: #000000;\">Examine domain group/user policies for risk</span></li>\n<li><span style=\"color: #000000;\">Verify indicator of compromise (IOC)</span></li>\n<li><span style=\"color: #000000;\">Find and kill malicious process</span></li>\n<li><span style=\"color: #000000;\">Remove all artifacts of infection</span></li>\n<li><span style=\"color: #000000;\">Stop exfiltration of corporate data</span></li>\n</ol>\n<h2><span style=\"color: #000000;\"><strong>Mission 13 – Operation Black Dragon </strong></span></h2>\n<p><span style=\"color: #000000;\">Defending the<strong> power grid </strong>is a prevailing concern today and Mission 13 focuses on cyber security techniques for <strong>Industry Control Systems and Supervisory Control and Data Acquisition systems (ICS/SCADA)</strong>.  Players conduct a cyber defense assessment mission on a power distribution plant. The end state of the assessment will be a defensible power grid with local defender ability to detect attempts to compromise the grid as well as the ability to attribute any attacks and respond accordingly.</span></p>\n<p><span style=\"color: #000000;\"><u>Core competencies used in the mission: </u></span></p>\n<ul>\n<li><span style=\"color: #000000;\"> Risk Management</span></li>\n<li><span style=\"color: #000000;\">Incident Response Management</span></li>\n<li><span style=\"color: #000000;\">Information Systems and Network Security</span></li>\n<li><span style=\"color: #000000;\">Vulnerability Assessment</span></li>\n<li><span style=\"color: #000000;\">Hacking Methodologies</span></li>\n</ul>\n<p><span style=\"color: #000000;\">Mission Objectives:</span></p>\n<ol>\n<li><span style=\"color: #000000;\">Evaluate risks to the plant</span></li>\n<li><span style=\"color: #000000;\">Determine if there are any indicators of compromise to the network</span></li>\n<li><span style=\"color: #000000;\">Improve monitoring of network behavior</span></li>\n<li><span style=\"color: #000000;\">Mitigate an attack if necessary</span></li>\n</ol>\n<h2><span style=\"color: #000000;\"><strong>Battle Room 8 – </strong><strong>Network Analysis Using Packet Capture (PCAP)</strong></span></h2>\n<p><span style=\"color: #000000;\">Battle Room 8 delivers new exercises to teach network forensic investigation skills via analysis of a PCAP. Analyze the file to answer objectives related to topics such as origins of C2 traffic, identification of credentials in the clear, sensitive document exfiltration, and database activity using a Kali image with multiple network analysis tools installed.</span></p>\n<p><span style=\"color: #000000;\"><u>Core competencies used in the mission: </u></span></p>\n<ul>\n<li><span style=\"color: #000000;\">Intrusion Detection Basics</span></li>\n<li><span style=\"color: #000000;\">Packet Capture Analysis</span></li>\n</ul>\n<h2><span style=\"color: #000000;\"><strong>Battle Room 10 – </strong><strong>Scripting Fundamentals </strong></span></h2>\n<p><span style=\"color: #000000;\">Scripting is a <em>critical</em> cyber security operator skillset for any team. Previously announced and now available, Battle Room 10 is the first Project Ares exercise focus on this key skill.  The player conducts a series of regimented tasks using the Python language in order to become more familiar with fundamental programming concepts. This battle room is geared towards players looking to develop basic programming and scripting skills, such as:</span></p>\n<ul>\n<li><span style=\"color: #000000;\">Functions</span></li>\n<li><span style=\"color: #000000;\">Classes and Objects</span></li>\n<li><span style=\"color: #000000;\">File Manipulation</span></li>\n<li><span style=\"color: #000000;\">Exception Handling</span></li>\n<li><span style=\"color: #000000;\">User Input</span></li>\n<li><span style=\"color: #000000;\">Data Structures</span></li>\n<li><span style=\"color: #000000;\">Conditional Statements</span></li>\n<li><span style=\"color: #000000;\">Loops</span></li>\n<li><span style=\"color: #000000;\">Variables</span></li>\n<li><span style=\"color: #000000;\">Numbers &amp; Operators</span></li>\n<li><span style=\"color: #000000;\">Casting</span></li>\n<li><span style=\"color: #000000;\">String Manipulation</span></li>\n</ul>\n<p><span style=\"color: #000000;\"><u>Core competency used in the mission: </u></span></p>\n<ul>\n<li><span style=\"color: #000000;\">Basic knowledge of programming concepts</span></li>\n</ul>\n<p><span style=\"color: #000000;\"><strong>Game client performance optimizations </strong></span></p>\n<p><span style=\"color: #000000;\">We made several adjustments to improve the performance of Project Ares and ensure a smooth player experience throughout the platform.</span></p>\n<ul>\n<li><span style=\"color: #000000;\">The application size has been reduced by optimizing the texture, font, and 3D assets. This will improve the load time for the game client application.</span></li>\n<li><span style=\"color: #000000;\">3D assets were optimized to minimize CPU and GPU loads to make the game client run smoother; especially on lower performance computers.</span></li>\n<li><span style=\"color: #000000;\">The game client frame rate can now be capped to a lower rate (i.e. 15fps) to lower CPU utilization for very resource constrained client computers.</span></li>\n</ul>\n<h3><span style=\"color: #000000;\">These features are part of the Project Ares version 3.6.4 on the Azure cloud which is available now. Similar updates in Project Ares version 3.6.5 for vCenter servers will be available shortly.</span></h3>\n<p>&nbsp;</p>\n"},"site":{"siteMetadata":{"title":"Circadence","description":"Build cyber skills hands-on with Project Ares cyber range platform."}}},"pageContext":{"id":"f3d25848-4d7e-51d8-a564-725f3c5a4810","featured_img":"https://staging.circadence.com/wp-content/uploads/2019/07/M6_D.png"}}}