Security Analysis
Purple Team Trainings
The term Team
may be correct in Red and Blue teaming, as this is a fixed group whose goal is either to defend the infrastructure and, in the case of the Red Team, to develop and execute attack scenarios. The Purple Team is a combination of members from both teams.
What is the Purple Team concerned with?
Both the Red Team and the Blue Team are responsible for improving IT security within an organization, but there are often rivalries or communication problems between the teams because both want to keep their approaches to themselves. For example, the Red Team does not share all the methods used to compromise systems, while Blue Teams usually do not want to share how they detected and mitigated attacks.
This is where the Purple Team comes in. The team is designed to cause Red and Blue team members to collaborate better and more effectively, and to share information between these teams. The Purple Team also serves as a communication interface to other departments within the organization in the event of incident response.
Tasks of the Purple Team
- Promote information exchange
- Communication interface for incident response and crisis management
- Further development of existing security policies in coordination with Red, Blue Team and management
- Development of trainings
Trainings for the Purple Team
Do you have questions about our offers? We will be happy to advise you: +41 44 832 50 80 | Contact form
Purple Team Trainings
- EC-Council Certified Network Defender (CND)
- EC-Council Certified Threat Intelligence Analyst (CTIA)
- EC-Council Computer Hacking Forensic Investigator (CHFI)
- EC-Council Certified Incident Handler (ECIH)
- EC-Council Certified Cloud Security Engineer (CCSE)
- EC-Council Certified Cybersecurity Technician (CCT)
- Systems Security Certified Practitioner (SSCP)
- Packet Analysis with Wireshark Analyzer (PAW)
- Advanced Packet Analysis with Wireshark Analyzer (APAW)
- Packet Analysis Power Workshop (PAPW)
- CyberSec First Responder (CFR): Threat Detection & Response (CFR)
- EC-Council Certified Ethical Hacking (CEH)
- EC-Council Certified Penetration Testing Professional (CPENT)
- Cyber Security & ANTI-HACKING Workshop (HACK)
- Verschlüsselung und Public Key Infrastructure PKI - Intensiv (VPKIK)
- IT-Forensik Spezialist (ZITF)
- Cyber Security Analyst (CSA)
- IT-Security in der Automatisierungstechnik und Gebäudeautomation (ITSATGA)
- PPA 3 KALI Grundlagen (S3KG)
- PPA 4 KALI Aufbau (S4KA)
- PPA 5 Metasploit Framework (S5MSF)
- PPA 6 Fortgeschrittener Einsatz von Metasploit (S6FEMS)
- ISACA Certified Information Security Manager (CISM) (CISM)
- ISC2 CISSP Certified Information System Security Professional Prüfungsvorbereitungskurs (CISSP)
- ISC2 Certified Cloud Security Professional (CCSP) (CCSP)
- ISC2 CSSLP Certified Secure Software Lifecycle Professional Prüfungsvorbereitungskurs (CSSLP)
- Security Engineering on AWS (AWSSO)
- Master Class: Securing Active Directory Deep Dive (SADDD-L1)
- Master Class: Securing Active Directory Deep Dive LEVEL 2 (SADDD-L2)
- Microsoft Security, Compliance, and Identity Fundamentals (SC-900T00)
- Microsoft Security Operations Analyst (SC-200T00)