Introduction to Network and Operating System basics. Includes an overview of threats, cyber attacks and how they work. This course includes an introduction to the Cyber Range and SOC operations.
The course is delivered as a hands-on, cyber attack simulation. Students are required to identify the attack, mitigate the compromise and then remediate the damage. Each scenario concludes with a discussion of measures to prevent a future attack.
The Certified CMMC Professional course provides the CMMC knowledge required to support CMMC certification. Considerable effort is allocated to understanding security standards and documentation.
The AWS Certified Cloud Practitioner program provides foundational AWS knowledge. Course material presents AWS Cloud concepts, services, and terminology. Ideal for those with limited cloud experience or no prior IT experience.
The Certified Information Systems Security Professional course is designed for experienced security practitioners, managers and executives applying their knowledge across a wide array of security practices and principles
BCR Cyber’s Range provides advanced cyber security training utilizing a hyper-realistic virtual network environment, advanced network tools and real-world attack scenarios. It operates as a closed, sequestered environment. Cybersecurity trainees, work in a safe and secure learning environment that simulates complex, enterprise network environments, generates realistic traffic flow and then executes real-world threats. Trainees use commercial Security Operation Center (SOC) tools to monitor the system, detect the threat, mitigate the compromise, remediate any damage, and then modify the network configuration as required to prevent future attacks. BCR Cyber’s Range provides a safe, real-world cyber training environment supporting advanced cyber training and testing. The risks associated with the real-world threats utilized dictated that their deployment be limited to a closed training / testing network.
The Range training system represents a hands-on, holistic approach to cyber training. The training flow can be divided to three main steps each part of the integrated Training Management System (TMS):
1. Training Setup – In this stage the trainer defines the training structure, taking into consideration its goals and the skills of the trainees. The relevant cyber-attack scenarios are selected. The selected network is then automatically cloned and allocated for each scenario.
2. Training Execution – The live training phase in which legitimate traffic is injected into the training network. The selected attack scenarios are then streamed into the network at the direction of trainer. The attack includes attempts to inflect damage such as business disruption, confidentiality and information loss. The trainers monitor the session, and provide feedback / guidance according to the attack scenario.
3. Training Review – At this point the trainer debriefs the trainees by reviewing their performance during the training session and analyzing the attack. The training session is concluded with group and individual feedback, a summary of lessons learned and emphasis on improvement