Enterprise Defenses
A thorough course for Blue Team beginners to explore the core concept of enterprise defense.
40/80 Hours
Blue Team
40/80 Hours
Blue Team


The Enterprise Network is layered and complex. To defend it efficiently and secure its integrity, the Blue Team must examine it and familiarize themselves with its structure and components. Successful Blue Teams follow an in-depth multi-stage process, analyzing, identifying, and action planning. First and foremost, the team needs to map the network to ensure no part is left unprotected. Moving forward, the team must divide the network into physical chunks to restrict the ability to maneuver if an attacker gets inside the network. Finally, the team must implement continuous scans to evaluate the situation and identify any other potential risks. Ultimately, the Blue Team acts as a protecting barrier between hackers and the network.

The course covers the following topics:


It’s important to improve the accordion’s behaviour

Course Introduction
  • First thing first
  • The Enterprise Network
  • Inventory with NMAP
  • Tuning NMAP for Better Results
  • NMAP Reporting
  • Automating Inventory Scan
Segmentation with IP Tables
  • Network Segmentation Primer
  • Linux Host Based Firewall
  • SPI and Logging
  • First Security Policy
  • Advanced Configuration
Role Based Security Policies
  • Establishing Gateway Policies
  • Advanced Gateway Policies
  • Application Inbound Service Policies
  • Application Outbound Service Policies
  • Windows Firewall
  • Windows Firewall Management
Vulnerability Management
  • Vulnerability Scanners
  • Working with scanner reports
  • Vulnerability Prioritization
  • VA Automation
  • Windows Patch Management
  • Linux Patch Management
Application Whitelisting
  • Microsoft Software Restriction Policies
  • Controlling Privileges by Path
  • Fine-grain Decisions
Don't touch this tab

About CYBERPRO was founded in cooperation with international information security and instruction authorities who bring to Israel world-leading cyber training technologies and a learning experience of the highest standard available today.

The partners include the IITC group which has been training graduates for the high tech industry for over 20 years, and was selected as the training center for the Cisco Company in Israel.

CYBERPRO’s advanced, sought-after training courses in the areas of infrastructures, information security and cyber are world famous. These training courses were developed by some of the best cyber experts in the world, for international security organizations that emphasize the high training capabilities, the professional learning methods and the unique training and practice technologies. Our connection with international groups allows our students to be exposed to unique employment opportunities in Israel and abroad.

The training and learning tracks are all based much hands-on practice and preparation for the industry and profession requirements, so they include technological labs and practice sessions using one of the most advanced simulators in the world.

    • Beginner blue teamers
    • User-level knowledge of computers and the Internet
    • Advanced level of English
    • Familiarity with the Microsoft domain services
    • Familiarity with Linux
    • Mapping and Managing the organization IT\network inventory
    • Creating security policy for the organizations
    • Segmentation for better security posture
    • Vulnerabilities management