Cyber Range Simulation Training
Cyber Range Services simulate networks, traffic and threats over virtual machines, and can feature additional appliances and hardware to accurately represent company networks. The simulated network is injected with traffic, simulating typical activity such as user emails, web-surfing, and server communications. In addition, real-life attack scenarios are injected into the network, using our predefined attack scenario library as well as custom-built scenarios. Trainees are scored as they identify, track, investigate, respond and remediate threats and reach predefined session’s goals. The session is recorded and documented on a timeline, to be later replayed and reviewed in a debriefing session. Trainees’ skills and capabilities are evaluated for further reference and training. Every session can be rolled-back and repeated. The Range Services provide IT and OT network simulation with physical OT hardware, and supports both individual and team training.
We can provide you Visibility
with the GLESEC’s Seven Elements Cyber Security Model ( 7eCSMTM )
Your choice of many options to help you take charge of your cyber-security