SecurityExercisesServicesCyvantage copy.png
 

Cyber Security Exercises

CyVantage has decades of experience in developing and delivering robust training and assessment environments for military, Federal, and commercial clients. Cyber Security exercises can be used to train individuals or teams in a realistic virtual environment that provides simulated network traffic, realistic network infrastructure (e.g. Active Directory, Exchange), and common Internet services (e.g DNS, SMTP, Websites). These exercises can also be used to assess security or IT staff capabilities and identify strengths and deficiencies.

EngineeringServices_Cyvantage.jpg

CyVantage has decades of experience in developing and delivering robust training and assessment environments for military, Federal, and commercial clients. These exercises provide hands-on, practical experiences that simulate current real world tools and threats. Cyber Security exercises can be used to train individuals or teams in a realistic virtual environment that provides simulated network traffic, realistic network infrastructure (e.g. Active Directory, Exchange), and common Internet services (e.g DNS, SMTP, Websites). These exercises can also be used to assess security or IT staff capabilities and identify strengths and deficiencies. We design and build the environments, facilitate the exercises, and provide expert training.

Common types of exercises are provided by CyVantage and our partner TwistedLogic

CAPTURE THE FLAG (CTF)

These can be individual or team based

RED VS. BLUE

A team of players are responsible for defending a network while still maintaining services (Blue), while another team is responsible for attacking the network (Red)

DEFENSE

Similar to the Red vs Blue, but TwistedLogic provides the Red Team activity