What Is A Cyber Range?
A cyber range is a controlled environment that offers hands-on training to cybersecurity professionals to learn how to detect and mitigate cyber attacks using the same equipment they will use on the job.
The range simulates a wide range of cyber attacks on IT infrastructure, networks, software platforms, and applications. The technology used in the range can monitor and evaluate the trainee's progress and performance as they gain experience through simulated exercises. By using a cyber range, cybersecurity professionals can develop the confidence they need to defend against cyber threats.
The cyber range also incorporates a Learning Management System (LMS) that enables both instructors and students to progress through a defined training program. The LMS is connected to an orchestration layer that connects specific parts of the curriculum with the underlying IT assets that make up the range. This allows instructors to simulate various attacks and evaluate the students' defensive techniques.
The cyber range's infrastructure includes a network, storage, compute, switches, routers, firewalls, and other necessary components. Some ranges are built using open source platforms like OpenStack, and virtualization layers are used to reduce the range's physical footprint. The range's target infrastructure simulates the digital assets that may be subject to cyber attacks, and this accuracy allows instructors to evaluate the student's readiness to repel an actual attack and provide real-time feedback.
Besides training, cyber ranges are useful for experimenting with new cyber defense technologies and solving complex cyber problems. Organizations can use the range as a safe space to test new ideas and evaluate how teams interact with emerging cybersecurity solutions.
Cyber Range Projects and Resources:
https://levelup.gitconnected.com/building-azure-cyber-ranges-for-learning-and-fun-9df1debb2eae
https://www.linkedin.com/pulse/how-i-created-my-own-cyber-security-lab-using-microsoft-jack-moore/
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWSCvJ
https://www.sans.org/blog/build-hack-defend-azure-identity/
https://www.codefellows.org/blog/build-your-own-home-cyber-range-part1/
https://aws.amazon.com/blogs/security/what-is-cyber-range-how-do-you-build-one-aws/
Ranges sourced from Security Advisor Alliance Mentors