We are taking Cyber Range on the Road and we are excited that you will be joining us in London! Get ready for a high-tech, FUN way to learn the very latest security strategies and techniques.
At the Cyber Range, you and your teams will:
- Master skills and techniques by identifying and preventing live attacks with best practices tips from our experienced instructors.
- Create and test different security strategies by researching and responding to real-world threats.
- Strengthen your execution by building and testing end-to-end prevention processes during full-on cyber-attack scenarios.
What’s more, you’ll receive a course certificate after completing your Cyber Range session.
- An exercise network managed by on-site teams, reproducing a realistic production environment.
- Simulated legitimate production traffic from numerous operating systems, applications and devices.
- Malicious traffic: All Cyber Range attacks use the latest real threats, pulled from the internet and re-generated using Cyber Test Systems Network Traffic Generators in the test environment (see scenarios below).
Each team manages and prevents threats on its own network using its own Next-Generation Security Platform deployment. For example, in this exercise, teams use Palo Alto Networks® next-generation technology to identify all applications on the network, apply URL Filtering, create content-based white-listing policies, and identify and generate real-time prevention against malicious software, exploits, and new threats across IP addresses and URLs.
Pre-requisite for the Cyber Range attendees:
In order to get the most out of your Cyber Range training, you should either be familiar with firewall policy creation or, prior to attending, take a Virtual Ultimate Test Drive (next-generation firewall) for a guided, hands-on experience doing so.
You will need to bring your own WiFi-Enabled Laptop with a pre-loaded Browser: Chrome or Firefox. Please, before the session, ensure you can disable VPN connections.
Cyber Range challenges participants to maintain the availability, scalability, security, and stability of the network and application infrastructure most often targeted and affected by cyberattacks. Cyber Range instructors simulate network functions and traffic to create a realistic network experience. A typical Cyber Range session consists of five teams:
- Green Team: Creates “legitimate” user and server application traffic.
- Red Team: Acts as malicious users and malicious or compromised servers.
- Yellow Team: Simulates innocent users clicking on phishing links or unknowingly installing malicious applications and compromising the network’s security.
- White Team: Launches cyberattack scenarios, creates traffic and monitors the success or failure of the Blue Team in terms of incident handling and scenario response.
- Blue Team: Represents the network operations center, security operations center and Cyber Incident Response Team.