Back to All Partner Courses

SafeBreach Partners Pre-Sales Course

Start Now

7

Lessons

6

Videos

All

Skill Level

00:30m

Duration

English

Language

Table of Contents

OVERVIEW

This course will introduce you to our product. You will learn about Breach and Attack Simulation (BAS) technology, you will have a first introduction to SafeBreach platform screens and features.

In this course, you will learn :

  • What is BAS
  • Deployment Options
  • Simulator Deployment Strategy
  • Simulator Roles
  • Integrations Overview

Lesson 1 – What Is BAS

Breach and Attack Simulation (BAS) is a cybersecurity testing method that simulates real-world cyber attacks on a network or system to assess its vulnerabilities and the effectiveness of its defenses. The goal of BAS is to identify and prioritize vulnerabilities, assess the potential impact of an attack, and validate the effectiveness of the organization’s security controls and response plans. BAS can be used to test the security of networks, applications, servers, and other IT assets, and can help organizations improve their cybersecurity posture by identifying and addressing weaknesses before they can be exploited by attackers. It typically involves the use of specialized software and tools that mimic the tactics, techniques, and procedures (TTPs) used by real-world attackers.

Lesson 2 – Deployment Options

SafeBreach offers two deployment options – On-premise and cloud (SaaS). If you are deploying in cloud, you can skip the next video. If not, watch the video to understand the on-premise method :

Lesson 3 – Simulator Deployment Strategy

The simulators will be deployed in your system and will be used as sensors. They will attack and defend your systems during the scenarios, and provide details about vulnerabilities and breaches. The simulators deployment should represent your network, and their deployment position is important for the effectiveness of the service. This video will demonstrate the correct way to deploy them :

Lesson 4 – Simulator Roles

Simulators can play different roles. To receive the maximum value from your deployment, you will need to assign the correct roles to the correct simulators. Watch this video and learn how to set rules to the simulators:

Lesson 5 – Integrations Overview

In this lesson, you will learn about the different types of integrations, and understand the use cases for each one of them.

SafeBreach can be integrated to different types of 3rd-party vendors. Integration with your existing security products can increase the effectiveness of our product significantly.

As you probably noticed, our platform has a lot of features to offer. In order to use them properly, you need to have an initial setup that will represent your network and allow you to use all those features and attacks. Now, you know the product. Let`s understand the application’s workflow:

Attack

The first step of the operation. Attack section allows the user to set up scenarios. You can choose pre-configured scenarios from the SafeBreach Scenarios page or from the Playbook. You can build attacks based on your Vulnerabily Management integrations and you can configure your own attacks using the Studio.

Analyze

The second step of operation. After you ran some tests, you can use the analysis tools. Simulation Results screen will display the results by order and help you by filtering them. MITRE ATT&CK Board will display the results in a MITRE oriented map, and the Breach Explorer will present your possible breaches and data-leakage paths in a visual way.

Remediate

After you decide about your remediation priorities based on the attack analyses, you can use the Insights panel to remediate using a specific method or technique. The Vulnerability Management screen screen will help prioritize which vulnerabilities to remediate first.

Report

Monitor your network’s security status by using our pre-configured Dashboards or configure your own dashboard. Use the Reports screen to generate PDF reports to present them to your stakeholders. The Risk Map will help you to emphasize the possible breaches between your system components and network segments.

Lesson 6 – Product Demo & Overview

Now, let`s see an overview of our platform, and understand the screens and features of it :

Lesson 7 – Attack Types (Optional)

The following videos are provided for your reference. Watching them is optional and NOT required to pass the certification.

https://academy.safebreach.com/courses/attack-course/

Congratulations !

You have finished the Pre-Sales course. Proceed to take the Pre-Sales Exam and request your certification.

Proceed