What is a cyber range?


When it comes to cyberthreats, it is not a matter of if, but when an organization is going to be targeted by cybercriminals. Will you and your organization be ready?

Fortunately, the real thing does not have to be the first time that you or your team has their skills put to the test. Cyber ranges provide you and your security team with a proving ground to apply the latest skills, techniques and best practices needed to stay at the top of their game and ahead of industry trends.

Much like their military predecessors, cyber ranges are realistic, controlled, virtual training environments designed to train professionals with hands-on learning scenarios that replicate reality with high-fidelity simulations of cyberthreats, complete with interactive network devices, servers and hosts specifically tuned for training purposes. In other words, cyber ranges are interactive representations of local organizational networks and systems, complete with tools and applications standing by to provide an equally realistic, safe and legal environment for students to apply what they are learning or test new defensive measures. 

Because no organization wants to actually expose their critical infrastructure to the worst that cyberattackers have to offer, a cyber range is the next best thing. This practice is critical to improving skills, tactics and techniques, and refining technology for today’s current security professionals and those preparing to take on what lies ahead.

Who builds and hosts cyber ranges?

Because of their many benefits, more and more organizations are developing their own or joining existing cyber ranges, leading to an explosion in interest and options for professionals to choose from. In fact, there are cyber ranges that are maintained and utilized by organizations across the government, the private sector, nonprofit organizations and in academic settings. Similarly, there are cyber ranges that focus on specific (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Patrick Mallory. Read the original post at: