{"componentChunkName":"component---src-templates-post-js","path":"/blog/cyber-ranges-101-and-how-they-improve-security-training/","result":{"data":{"wordpressPost":{"title":"Cyber Ranges and How They Improve Security Training","content":"<h2><strong>WHAT ARE CYBER RANGES?</strong></h2>\n<p><a href=\"https://www.circadence.com/solutions/topic/cyber-ranges/\"><strong>Cyber ranges</strong></a> <span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">were initially developed </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">by</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\"> government </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">agencies</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\"> </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">looking to better train their </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">cyber operators</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\"> on </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">new </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">skills and techniques. </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">To do this, a physical range or ranges were installed on-premise.  </span></span><span class=\"TextRun MacChromeBold SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">Cyber range </span></span><span class=\"TextRun MacChromeBold SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"ContextualSpellingAndGrammarError SCXW237742505 BCX0\" data-wac-het=\"1\">providers</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"ContextualSpellingAndGrammarError SCXW237742505 BCX0\" data-wac-het=\"1\"> </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"ContextualSpellingAndGrammarError SCXW237742505 BCX0\" data-wac-het=\"1\">built</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\"> </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">representations of actual networks, systems, and tools </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">that helped</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\"> cyber professionals safely train in virtual, secure environments without compromising the </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">agency’s </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">operation</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">al</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\"> network infrastructure.</span></span></p>\n<p><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">Today, cyber ranges are used in the </span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">cyber security </span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">sector</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\"> to effectively train </span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">IT</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\"> professionals in all industries</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\"> and help improve </span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">defense</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">s</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\"> against cyber</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">&#8211;</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">attacks. As technology advance</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">d</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">, </span></span><span class=\"TextRun MacChromeBold SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">cyber range training</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\"> advanced</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\"> as well</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">, both in scope and potential. More on this later.</span></span><span class=\"EOP SCXW100932007 BCX0\" data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<p>To schedule a demo of Circadence’s <span style=\"color: #333333;\">cyber range platform</span>, <a href=\"https://calendly.com/circadence-sales/discovery-call?month=2020-08\">click here</a>.</p>\n<p><iframe src=\"//www.youtube.com/embed/YR2-XX4GrJA\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe></p>\n<p>The National Initiative for Cybersecurity Education reports that cyber ranges provide:</p>\n<ul>\n<li>An environment where new ideas can be tested safely and teams and work to solve complex cyber problems</li>\n<li>Performance-based learning and assessment</li>\n<li>A simulated environment where teams can work together to improve teamwork and team capabilities</li>\n<li>Real-time feedback</li>\n<li>Simulate on-the-job experience</li>\n</ul>\n<p><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">Most</span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\"> cyber ranges come in </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">one of </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">two forms: </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">A network </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">environment without pre-programmed content; or </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">a network environment with </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">prescriptive content that may or may not be relevant to a user’s industry. Either cyber range type limits the learner’s ability to develop </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">enriched</span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\"> skill sets</span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\"> beyond </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">what their </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">specific</span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\"> work role </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">may dictate. </span></span><span class=\"EOP SCXW54477183 BCX0\" data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<h2><span class=\"TextRun MacChromeBold SCXW34806530 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34806530 BCX0\" data-ccp-parastyle=\"heading 2\" data-wac-het=\"1\">UNDERSTANDING</span></span><span class=\"TextRun MacChromeBold SCXW34806530 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34806530 BCX0\" data-ccp-parastyle=\"heading 2\" data-wac-het=\"1\"> &amp; EVOLVING</span></span><span class=\"TextRun MacChromeBold SCXW34806530 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34806530 BCX0\" data-ccp-parastyle=\"heading 2\" data-wac-het=\"1\"> </span></span><span class=\"TextRun MacChromeBold SCXW34806530 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34806530 BCX0\" data-ccp-parastyle=\"heading 2\" data-wac-het=\"1\">CYBER RANGES IN A BOX</span></span><span class=\"EOP SCXW34806530 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\" data-wac-het=\"1\"> </span></h2>\n<p><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">Typically,</span></span><span class=\"TextRun MacChromeBold BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\"> Cyber range in a box</span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\"> </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">has been </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">a collection of virtual machines hosted on an on-premise </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">system</span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">. </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">However,</span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\"> Circadence has taken the concept of a cyber range in a box and placed it the cloud to better scale cyber training. We lovingly call this </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"SpellingError BCX0 SCXW227397673\" data-wac-het=\"1\">CyRaaS</span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">, or Cyber Range-as-a-Service, which is </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">integrated into</span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\"> </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">our Project Ares cyber learning platform.</span></span></p>\n<p><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">Instead of purchasing a physical set of machines to take up space in a room, virtual machines exist in the cloud and </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">can be </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">accessed by more professionals </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">from any</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\"> location </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">who want to train persistently and develop cyber skills. </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">The cloud is recognized as one of the most secure spaces to house network components (and physical infrastructure). To ensure cyber ranges </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">spin up environments</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\"> quickly</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">, deliver</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\"> the latest </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">training </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">content, and engage users in productive training activities</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">, </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">accessing </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">cyber </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">ranges in the</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\"> cloud is the latest and greatest approach for </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">professionals</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\"> training in </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">‘sandbox’</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\"> environments.</span></span><span class=\"EOP SCXW9643356 BCX0\" data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<p><img class=\"aligncenter wp-image-10935 size-full\" src=\"https://www.circadence.com/wp-content/uploads/2019/04/MissionRecon1-server-in-game-screenshot-1.jpg\" alt=\"in-game-screeenshot-of-network-map\" width=\"600\" height=\"338\" srcset=\"https://staging.circadence.com/wp-content/uploads/2019/04/MissionRecon1-server-in-game-screenshot-1.jpg 600w, https://staging.circadence.com/wp-content/uploads/2019/04/MissionRecon1-server-in-game-screenshot-1-300x169.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" /></p>\n<p><span data-contrast=\"none\">By offering </span><span data-contrast=\"none\">cloud based,</span><span data-contrast=\"none\"> cyber range in a box services to support cyber training in Project Ares, we are able to deliver</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">more relevant</span><span data-contrast=\"none\"> tools and technologies to help professionals </span><span data-contrast=\"none\">gain</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">the best cyber</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">security training </span><span data-contrast=\"none\">possible</span><span data-contrast=\"none\">. </span><span data-wac-het=\"2\"><br />\n</span><span data-wac-het=\"2\"><br />\n</span><span data-contrast=\"none\">The</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">service </span><span data-contrast=\"none\">allows Project Ares to </span><span data-contrast=\"none\">emulate</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">industry-relevant </span><span data-contrast=\"none\">network configurations with</span><span data-contrast=\"none\">in</span><span data-contrast=\"none\"> learning activities </span><span data-contrast=\"none\">that </span><span data-contrast=\"none\">help trainees practice </span><span data-contrast=\"none\">defensive tactics</span><span data-contrast=\"none\">. </span><span data-contrast=\"none\">Cloud-based </span><span data-contrast=\"none\">c</span><span data-contrast=\"none\">yber ranges</span><span data-contrast=\"none\"> also </span><span data-contrast=\"none\">offer </span>hands-on keyboard experience<span data-contrast=\"none\"> with </span><span data-contrast=\"none\">real world</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">tools</span><span data-contrast=\"none\"> and</span><span data-contrast=\"none\"> emulated network traffic to reflect the </span><span data-contrast=\"none\">authentic</span><span data-contrast=\"none\"> feeling of an actual cyber</span><span data-contrast=\"none\">&#8211;</span><span data-contrast=\"none\">attack. </span><span data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<p><span data-contrast=\"none\">Advances in Artificial Intelligence and machine </span><span data-contrast=\"auto\">learning allow us to use cloud ranges to their full potential by tracking</span><span data-contrast=\"auto\"> patterns in </span><span data-contrast=\"auto\">training </span><span data-contrast=\"auto\">data </span><span data-contrast=\"auto\">to r</span><span data-contrast=\"auto\">eveal </span><span data-contrast=\"auto\">player learning progression </span><span data-contrast=\"auto\">with minimal human intervention</span><span data-contrast=\"auto\"> and oversight</span><span data-contrast=\"auto\">. Those patterns are</span><span data-contrast=\"auto\"> then</span><span data-contrast=\"auto\"> used to inform the recommendations of an in-game advisor</span><span data-contrast=\"auto\"> (Athena) that has</span><span data-contrast=\"auto\"> chat bot functionality so players can </span><span data-contrast=\"auto\">get </span><span data-contrast=\"auto\">help on </span>cyber range training<span data-contrast=\"auto\"> activities </span><span data-contrast=\"auto\">in the platform</span><span data-contrast=\"auto\">. </span><span data-contrast=\"auto\">Further, cloud-based cyber range training</span><span data-contrast=\"auto\"> gives security </span><span data-contrast=\"none\">professionals better predictive capabilities</span><span data-contrast=\"none\"> when defending and anticipating threats—</span><span data-contrast=\"none\">and</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">according to Microsoft, even  “</span><a href=\"https://cloudblogs.microsoft.com/microsoftsecure/2018/09/05/practical-application-of-artificial-intelligence-that-can-transform-cybersecurity/\"><span data-contrast=\"none\">improve the efficacy of cyber</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">security</span></a><span data-contrast=\"none\">, the detection of hackers, and prevent </span><span data-contrast=\"none\">attacks before they occur.”</span><span data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<h2><strong>GAMIFIED CYBER RANGES </strong></h2>\n<p><span data-contrast=\"none\">Not only have we taken physical cyber ranges and placed them in the </span><span data-contrast=\"none\">cloud</span><span data-contrast=\"none\"> but we’ve added in elements of gamification to further drive the effectiveness of cyber training. </span><span data-wac-het=\"2\"><br />\n</span><span data-wac-het=\"2\"><br />\n</span><span data-contrast=\"none\">With many studies touting the </span><a href=\"https://www.circadence.com/the-benefits-of-active-gamified-learning-in-cyber-training/\"><span data-contrast=\"none\">benefits of gamification in learning</span></a><span data-contrast=\"none\">, it only makes sense that cyber ranges come equipped with </span><span data-contrast=\"none\">sets of </span><span data-contrast=\"none\">gamified element</span><span data-contrast=\"none\">s (e.g. leaderboards, scoring mechanisms, points, badges, levels, etc.)</span><span data-contrast=\"none\">. Project Ares has a series of </span>cyber learning games<span data-contrast=\"none\"> that teach foundational cyber concepts and terms</span><span data-contrast=\"none\">, </span>battle rooms<span data-contrast=\"none\"> that teach tools, tactics, and </span><span data-contrast=\"none\">procedures</span><span data-contrast=\"none\">, and </span><span data-contrast=\"none\">team-based </span>missions<span data-contrast=\"none\"> that </span><span data-contrast=\"none\">bring learning full circle when players are tasked with defending against a realistic cyber threat </span><span data-contrast=\"none\">scenario. </span><span data-contrast=\"none\"> This level of cyber learning is done in the cloud so professionals can work together from anywhere in the world to</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">collaborate and </span><span data-contrast=\"none\">defeat modern-day attacks. </span><span data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<p><span data-contrast=\"none\">We hope this post helped you understand the true potential of cyber ranges</span><span data-contrast=\"none\"> in the cloud</span><span data-contrast=\"none\"> and how they are evolving today to automate and augment cyber workforce</span><span data-contrast=\"none\"> training and learning</span><span data-contrast=\"none\">.</span><span data-contrast=\"none\"> </span><span data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<p><a style=\"border: 1px solid #333333; border-color: #FF9E1B; border-radius: 1px; border-width: 3px; color: #ff9e1b; display: inline-block; font-family: helvetica,arial,sans-serif; font-size: 14px; font-weight: 300; letter-spacing: 1px; line-height: 14px; padding: 12px 10px 12px 10px; text-align: center; text-decoration: none; width: 40%;\" href=\"https://calendly.com/circadence-sales/discovery-call?month=2020-08\" target=\"_blank\" rel=\"noopener noreferrer\">REQUEST A DEMO</a></p>\n"},"site":{"siteMetadata":{"title":"Circadence","description":"Build cyber skills hands-on with Project Ares cyber range platform."}}},"pageContext":{"id":"416bd88a-2f31-5d1d-a897-03e58c1c66ae","featured_img":"https://staging.circadence.com/wp-content/uploads/2019/04/CyRaaS_06_wallpaper_1366x768.jpg"}}}