AFTER 15 YEARS OF TRAINING SOC PROFESSIONALS, WE DECIDED TO BUILD
A HYPER REALISTIC & INTELLIGENCE-LED CYBERSECURITY TRAINING PLATFORM FOR

BLUE TEAMING

PURPLE TEAMING

RED TEAMING

DEVELOPED BY THE U.S. INTELLIGENCE COMMUNITY MEMBERS

IT’S TIME FOR THE NEXT PHASE IN CYBERSECURITY TRAINING

25+ years in the U.S. intelligence and defence made us think about building a training capability that is intelligence-led. Cyber ranges have been around for a while in the government and private sectors, and the technology behind almost always failed to evolve with the same geometric progression as the threats do. 

The threatscape brings out off shadows the need to apply PURPLE TEAMING techniques. Until a few time ago, it was a prerogative of the government agencies. SOC Range offers a set of capabilities to teach organisations how to get through incidents by thinking as an APT and vice versa.

SOC RANGE CYBERSECURITY TRAINING PLATFORM

Access the cloud version
or come at our training centers

Design & simulate any
IT infrastructure

Run cybersecurity
incidents

Use real-world SOC & hacking tools to exercise your skills

BLUE TEAMING

USE YOUR DAILY SOC TOOLS TO EXERCISE AGAINST SIMULATED ATTACKS

PURPLE TEAMING

COMBINE OFFENSIVE AND DEFENSIVE SKILLS TO MAKE ASSESSMENTS,
SHARE THE INTEL AND PROVIDE MEASURES

DESIGNED IT
INFRASTRUCTURE

OVER 180 CYBERSECURITY PROFESSIONALS TESTED THE PLATFORM AND PROVIDED VALUABLE FEEDBACK

RED TEAMING

USE ANY HACKING TOOLS TO EXERCISE AGAINST THE SIMULATED TARGET’S DEFENCE CAPABILITIES

A POWERFUL CYBER FORENSICS

TOOL FOR BLUE TEAMING

CSI Linux was developed by Computer Forensics, Incident Response, and Competitive Intelligence professionals to meet the current needs of the government agencies and the industry. CSI Linux is a multi-purpose, all inclusive, Operating System focused on online investigations of social media, domain recon, dark web, malware analysis, and more. IT offers investigators the ability to do their job using a software package that is centrally managed and updatable without having to go out of your way doing the daunting task of updating individual applications. 

A POWERFUL CYBER FORENSICS TOOL FOR BLUE TEAMING

CSI Linux was developed by Computer Forensics, Incident Response, and Competitive Intelligence professionals to meet the current needs of the government agencies and the industry. CSI Linux is a multi-purpose, all inclusive, Operating System focused on online investigations of social media, domain recon, dark web, malware analysis, and more. IT offers investigators the ability to do their job using a software package that is centrally managed and updatable without having to go out of your way doing the daunting task of updating individual applications. 

OVER 130 CYBERSECURITY PROFESSIONALS TESTED THE PLATFORM AND PROVIDED VALUABLE FEEDBACK

JUST AS THE SHOOTING RANGE IS IMPORTANT FOR MILITARY AND LAW ENFORCEMENT PERSONNEL TO PRACTICE, A CYBER RANGE IS CRITICAL FOR SOC TEAMS

WE TRAIN 

– Defence, Security & Intelligence
– Critical Infrastructure
– Financial
– Healthcare
– Telecom
– Aerospace
– Legal
– Logistics
– Manufacturing
– Academia
– Research, Innovation and Development

TWO TIERS OF LABS

1ST tier is within the main operating system where the resources inside the instance are dedicated to the tools used. This includes OSINT, digital forensics, incident response, reverse engineering, exploitation, SCADA/ICS tools and labs. 
2ND tier is a virtualised environment that allows the users to mimic target environments and multi-level network infrastructures.
The base tier can then be engaged in both attack and defense exercises targeting most of the available operating systems used today. 
The target systems include vulnerabilities found on common systems. Depending on the focus of the cyber drills, users can train against web applications, applications, and operating systems. On the other side of the coin, there are multiple vitalised systems specializing on threat identification and machine learning.

WE PROVIDE BESPOKE HYPER-REALISTIC EXERCISE SCENARIOS

PRE-MADE INTELLIGENCE-FED SCENARIOS ARE AVAILABLE

STANDARDISED & CUSTOMISED TRAINING

We have developed a cybersecurity curriculum and courses covering all aspects of the information security domains, from certification boot camps covered in the U.S. Department of Defense Directive DoDD 857-/8140, to custom training with malware analysis, darknet investigations, system exploitation, SCADA, and Digital Forensics and Incident Response. Currently, we deliver the following courses:
– EC-Council (CEH/ECSA/LPT, CHFI, ECIH, and CCISO)
– CompTIA (Network+, Security+, CySA+, Linux+)
– Advanced Hacking (System, Web Application)
– Incident Response, Forensic Data Recovery, Reverse Engineering
– SCADA/ICS/IIoT Security Offense and Defense
– Security Management (CISSP, CISM)

To help organisations in bringing their staff up to speed with cybersecurity concerns, we offer bespoke training to C-Level and senior management, IT departments, and general employees.

CONTACT US

FOR MORE INFORMATION

3 + 13 =