In this ❄ breaker, we’ll introduce you to the basics of Rogue Detection and Intrusion Analysis. You’ll start by researching techniques for identifying unwarranted devices on a network. Then you’ll walk through a scenario in which a rogue device may have been involved 👿 in a compromise. Finally, you’ll pull it all together and produce a report on your findings.
The premise of this challenge is that you’ve received a report stating a sensitive 📁 recently went missing. Experts believe a user may be acting as an insider and may have assisted in the theft, however, there is no evidence of this. You have been assigned to follow up and close the case.
During the exercise, a facilitator will be available to assist in case you need help. Remember, our goal is to maximize your learning so you can become a real security 🧙♂️