Cyber Security Exercises
CyVantage has decades of experience in developing and delivering robust training and assessment environments for military, Federal, and commercial clients. Cyber Security exercises can be used to train individuals or teams in a realistic virtual environment that provides simulated network traffic, realistic network infrastructure (e.g. Active Directory, Exchange), and common Internet services (e.g DNS, SMTP, Websites). These exercises can also be used to assess security or IT staff capabilities and identify strengths and deficiencies.
CyVantage has decades of experience in developing and delivering robust training and assessment environments for military, Federal, and commercial clients. These exercises provide hands-on, practical experiences that simulate current real world tools and threats. Cyber Security exercises can be used to train individuals or teams in a realistic virtual environment that provides simulated network traffic, realistic network infrastructure (e.g. Active Directory, Exchange), and common Internet services (e.g DNS, SMTP, Websites). These exercises can also be used to assess security or IT staff capabilities and identify strengths and deficiencies. We design and build the environments, facilitate the exercises, and provide expert training.
Common types of exercises are provided by CyVantage and our partner TwistedLogic
CAPTURE THE FLAG (CTF)
These can be individual or team based
RED VS. BLUE
A team of players are responsible for defending a network while still maintaining services (Blue), while another team is responsible for attacking the network (Red)
DEFENSE
Similar to the Red vs Blue, but TwistedLogic provides the Red Team activity