Network Defense Trainer
World Class Cybersecurity Training
NDT also integrates with other trainers and simulators, which can extend training scenarios further. These features allow for hyper-realistic simulations and industry-leading cyber awareness training.
SCALABLE’s NDT also offers unmatched reporting and analysis capabilities. The system records all trainee actions during the session, which can be reviewed for actionable feedback on performance allowing network professionals to gain critical insights into attack preparedness, and trainees to receive personalized feedback about how to improve.
Cyber-Attacks and "The Mission"
Cyber security training for any “mission”, whether it is keeping a bank’s website operational, running an airline operations center, or a fielding a military exercise, must be as realistic as possible in order to avoid “negative training” – that is, learning behavior or procedures that are actually ineffective in the real environment. In cyber defense training, this translates to having the behavior of the systems under cyber-attack perform in a repeatable manner consistent with how they would in the real world.
Hardware-based or VM-based cyber ranges which replicate information systems are limited in scale, costly, and time-consuming to configure. These ranges have little or no capability to simulate wireless networks with their inherent vulnerabilities. They also do not integrate the impact of a cyber-attack into an overall mission which is essential for realistic mission rehearsal.
SCALABLE’s Network Defense Trainer addresses all of these shortcomings with a new, unique approach to cyber defense. Our tools will enable your security team to develop a full cyber assessment of how prepared your organization is for cyber attacks.
Advantage of Network Digital Twins for Training
Network Defense Trainer provides trainees with the opportunity to apply knowledge in realistic, stressful situations in a high fidelity synthetic environment. The system provides cyber security training for situational awareness and rapid correct responses and will reinforce lessons learned with After Action Reviews that show trainees and observers what actually happened and why. NDT offers these unique advantages to the trainee:
- Effectively represent mobile wireless equipment and applications (and the vulnerabilities they include) as they interoperate with wired backbone network infrastructure and fixed computing systems
- Accurately model the information transport fabric between servers and end-point systems in high fidelity to better demonstrate the effects of cyber-attacks
- Seamlessly integrate (federate) with other training systems such as air traffic control, flight training, and kinetic battlefield simulators
Management workstations can be any type of host that supports standard web browsers (such as Firefox, Chrome, Safari, IE, etc.). The various management functions include:
Exercise Preparation allows the creation, modification, or selection of Lesson Plans, mission scenarios, network configurations, cyber-attacks, device mapping, role and trainee assignments, and sides and teams.
Exercise Control is used to load and unload an exercise, control federation execution, freeze and unfreeze, launch cyber-attacks, take snapshots during the exercise and restore them (in case a trainee made an unrecoverable mistake), and communicate with trainees using chat and VoIP.
The Cyber Operating Picture gives an indication of the state of the network and devices and can be used to launch cyber-attacks. An example is shown below.
Performance Evaluation keeps track of trainees’ progress. The launching of attacks is logged, and trainee’s responses (views, keystrokes, clicks, and communication with others) are logged along with response times, to assist with scoring. It maintains databases of trainees and the exercises they have completed along with their scores.
After Action Review plays back any player’s screenshots (“perceived truth”) and actions on a timeline with attacks, other players’ views, and the actual state of the network (the “ground truth”). An example screenshot is shown below.
Cyber Warfare Training
Networked modeling and simulation systems realistically represent combat, from sensors and weapons systems to the tactical behavior of individual entities and military units.
Training for the Cyber Attacks of Tomorrow
In this tech brief, we will examine the state of play when it comes to cyberattacks; the impact and implications of the resulting cybersecurity breaches, and explore the advances in training technologies.
Get cutting-edge industry information. Access the entire library for additional resources.
Virtual Cyber Range for Cyber Warfare Analysis and Training
Mitigate threats by accurately modeling the effects of cyber weapons for analysis, system testing and hardening, and training.
Cognitive Task Analysis Based Training for Cyber Situation Awareness
Using this approach can not only protect your network but can save valuable time and costs. During a network security assessment, the cyber analysts can spot vulnerabilities that leave the network open to threats and costly attacks.
Network Digital Twins for 21st Century Wargaming
Effective integration of professional wargaming in military force design, education, and training will be essential to charting our course in an era of strategic fluidity and rapid change.
Commercial enterprises, educational institutions, and governmental organizations around the world all depend on reliable, effective networks to deliver business-critical, mission-critical communications, and information. SCALABLE maintains a highly experienced group of technical professionals to support customers and projects of any scale and solve challenging problems with our advanced network digital twin technology.