Our Scenarios

CYBER SPACE, ENGAGED.

Welcome to the new era of cyber security!

Learn, train, test, measure and improve your digital dexterity and cyber resilience on our next-gen military-grade CYBER RANGES platform and technology.

OUR SOLUTION
Cyber Space

WHAT CYBER RANGES HAS TO OFFER YOU

Much like the diversity of cyber vulnerabilities, breaches and threats, your cyber security should be both versatile and agile. From staff training, ongoing skills development and recruitment assessment to performance review, our CYBER RANGES solution has a lot to offer.

Train with Cyber Ranges

TRAIN

Set up detailed replicas of your organization’s infrastructure and train your people. Alternatively, choose from our large scenario library and train for real-life cyber attacks on realistic systems and application environments.

Test Cyber Ranges

TEST

Test your organization's response and cyber resilience against realistic cyber threats and attacks.

Use CYBER RANGES as your prototype development lab to test new products, technologies and processes, for certification testing and to research on new and complex cyber ideas.

Compete with Cyber Ranges

COMPETE

Red Team vs Blue Team? Automatically simulate and organize multi-user game-like events to test your operational readiness.

Cyber Ranges Assess

ASSESS

Profile and test your workforce, identify skills gaps, and monitor your people’s expertise development over time.

Evaluate with Cyber Ranges

EVALUATE

Integrate hands-on competence assessment into your staffing processes, including recruitment, on-boarding and CPD. Cherry-pick the candidates with the appropriate skill-set.

Gain with Cyber Ranges

GAIN

Continuous security competencies development for your team at clear costs. Cutting-edge, hands-on training delivered anytime, anywhere. No onsite or travel costs, no operational disruptions.

SCENARIOS

600+ Single-user and Multi-user scenarios available.
Exciting new scenarios added every week.

Scroll Categories

Intro to File Upload #1

Intro to File Upload #1

ENGAGE
Vulnerable Dockers

Vulnerable Dockers

ENGAGE
Kerberos Tickets

Kerberos Tickets

ENGAGE
Windows Domains 102

Windows Domains 102

ENGAGE
CyberChef

CyberChef

ENGAGE
REMA IDA Pro & OllyDBG

REMA IDA Pro & OllyDBG

ENGAGE
Malware Analysis using YARA

Malware Analysis using YARA

ENGAGE
REMA – Patching

REMA – Patching

ENGAGE
CyberChef

CyberChef

ENGAGE
Mobile Malware Forensics

Mobile Malware Forensics

ENGAGE
Malware Analysis using YARA

Malware Analysis using YARA

ENGAGE
Windows Malware Analysis 101

Windows Malware Analysis 101

ENGAGE
CyberChef

CyberChef

ENGAGE
Crypto101 – Common Hashes

Crypto101 – Common Hashes

ENGAGE
Mobile Malware Forensics

Mobile Malware Forensics

ENGAGE
Malware Analysis using YARA

Malware Analysis using YARA

ENGAGE
Cyber Threat Intelligence

Cyber Threat Intelligence

ENGAGE
CyberChef

CyberChef

ENGAGE
Crypto101 – Common Hashes

Crypto101 – Common Hashes

ENGAGE
Wireshark PCAP analysis

Wireshark PCAP analysis

ENGAGE
Cyber Threat Intelligence

Cyber Threat Intelligence

ENGAGE
CyberChef

CyberChef

ENGAGE
Crypto101 – Common Hashes

Crypto101 – Common Hashes

ENGAGE
Wireshark PCAP analysis

Wireshark PCAP analysis

ENGAGE
CyberChef

CyberChef

ENGAGE
Crypto101 – Common Hashes

Crypto101 – Common Hashes

ENGAGE
Wireshark PCAP analysis

Wireshark PCAP analysis

ENGAGE
Malware Hunting and Analysis Labs

Malware Hunting and Analysis Labs

ENGAGE
Network Management

Network Management

ENGAGE
Intro to Linux File System

Intro to Linux File System

ENGAGE
Steganography 102

Steganography 102

ENGAGE
Basic Linux Firewall Mgmt

Basic Linux Firewall Mgmt

ENGAGE
Cyber Threat Intelligence

Cyber Threat Intelligence

ENGAGE
CyberChef

CyberChef

ENGAGE
Wireshark PCAP analysis

Wireshark PCAP analysis

ENGAGE

FEATURES

A family of powerful and customizable features that allow you to deliver a truly realistic training experience.

REALISTIC SIMULATIONS
SCENARIO COMPOSER
SCORING & REPORTING
INJECTOR ENGINE
ORCHESTRATION
TEAM-BASED SCENARIOS
Our Platform Features
  • Replicate corporate infrastructures
  • Use real systems and applications
  • Integrate your specific infrastructure assets
  • Scalable up to 1000s of simultaneous virtual machines
  • Create your own realistic scenarios
  • Leverage the library of commercial systems & applications
  • Add traffic simulation & cyber attacks to your scenarios
  • Collaborative creation of simulation environments
  • Easily repurpose existing scenarios to meet your needs
  • Individual & Team scoring
  • Per-category score
  • Score Timeline
  • Leaderboard
  • Tracking of individual activities
  • NIST NICE compliance.
  • Stateful attack simulation
  • Background Traffic Simulation
  • False positives generation
  • Red Team Automation
  • Library of simulated attacks and traffic patterns/types
  • Ability to create your own attacks & attack flows
  • Live injection during scenarios
  • Automatic management of the virtualization workflow for multi-user scenarios such as CTFs, competence assessments, attack and defence.
  • Each team has access to its own virtual environment
  • Team performance is affected by team members
  • Access to virtual environments is decided by the team
  • Instructor-led events

DEPLOYMENT OPTIONS

Training limitations are a thing of the past. Whether on-premise, on the cloud or on the move, CYBER RANGES allows you to deploy the option that suits your specific needs best.

as a service
AS A SERVICE

This is the default deployment, available at cyberranges.com where access to CYBER RANGES can be bought as a monthly subscription or on demand, giving access to CYBER RANGES scenarios and advanced functionalities.

hosted
HOSTED

This deployment option gives access to a private CYBER RANGES environment, granting the organization full control over user access and private scenarios workspace.

on premise
ON PREMISE

By deploying on premise, your organization has total control as well as additional access to CYBER RANGES functionalities that are not publicly available through the online, as-a-service option.

portable
PORTABLE

One shockproof cabin luggage with three powerful custom laptops, secure Internet Access Module, network switch and cabling.

Pre-installed CYBER RANGES along with a multitude of scenarios and our proprietary Injector Engine with real attack and traffic simulation. Literally train anywhere and anytime.

PARTNERS

CYBER RANGES enables our Channel Partners to deliver distinctive Value-Added propositions in the domain of cyber security capability assessment and development.

We welcome applications from qualified companies and consultants to discuss joint opportunities to resell and deliver CYBER RANGES in geographic territories and vertical markets.

Please fill in this short form and we shall get back to you: