The Fraunhofer Cyber Range is the world’s first defense training that combines hands-on training of complex attack simulations in a deeply engineered virtual environment, insights of the latest developments in hacking and technology, and best practices. It facilitates your rapid development of practical cybersecurity skills, enhances your skill set and provides necessary knowledge to tackle future threats successfully.
At the core of our training is our Cyber Range platform, a realistic training environment with various scenarios. It was initially developed in Israel by experts in defensive and offensive cybersecurity. The Fraunhofer Cyber Range team will be updating the scenarios continuously leveraging their insights on new attack schemes and patterns. Additionally, we can create customized scenarios, tailored to an organization.
You will encounter a complex network situation facing real life attacks and enhancing your cybersecurity defense skills. Their mission: stop the kill-chain, minimize damages and remove the attack from the system. A web server take down and website defacement are just the warm-up for a variety of scenarios that will be complemented by case study discussions and technology providing valuable insights into malware analyses, current hacking techniques and security of Internet infrastructures.
Do you have any questions about our trainings or would you like advice on how to prepare for a serious cyber attack?
We will be happy to advise you which modules of the Cyber Range training are most beneficial to you.
Are you looking for specific packages for your IT Security team?
We offer exclusive cyber range training courses for companies that improve the security skills of your IT experts and increase the resilience of your organization. Together with you, we determine the competence requirements in your company or your organziation and advise you on how to develop the right skills.
Are you interested in a Cyber Range training, but you do not have your own team?
In our open training courses, we welcome participants from a wide range of organizations and industries to join a group of up to 10 people in detecting and defending against cyber attacks.
Contact us for more information or your customized training3-day-training for SOC teams/employees providing you with skills to identify and fend off attacks.
3-5 day training with more complex scenarios for higher demands on analytical skills and problem-solving competence in coping with real attack situations.
A stress test for the whole business – Whilst your IT team defends against the attackers on your system, your management also tests processes, interfaces and communication channels to the outside and inside.
Think like an attacker to be a world-class defender! This training is a role-play where two teams will take turns to operate as attackers or defenders.
Attacking by the Red Team and defending by the Blue Team in real time is the goal of this module.
A deep dive into the analysis of infection routes, creating persistence and removing malware.
In this course you will learn what to do if Industrial Control Systems/Operational Technology have been compromised.
You want to customize your training to your specific needs? No problem! Let us create a customized offer for your security team!
Training can be offered as online or face-to-face training.
Participant in ATHENE Cyber Range Blue Team Basic Training (Information Security Officer of a major city)
Participant in ATHENE Cyber Range Blue Team Basic Training (IT Systems Administrator in the Public Administration of a district)
Participant in ATHENE Cyber Range Blue Team Basic Training (Systems Administrator in the Public Administration of a major city in Hessia)
Organizations and individuals: Who can train?
The platform supports different attack scenarios and is designed as an realistic company network. Various realistic attacks are offered, which are mainly aimed at employees who are responsible in defending the company against attacks. There are scenarios for beginners and advanced users, as well as special training courses, where the management is involved developing business cases out of those scenarios.
Organizations from all industries, government bodies and research institutes can profit from the ATHENE Cyber Range training.
As an organization, you can book the ATHENE Cyber Range for an exclusive training of your security team. Learn more about our trainings or contact us for a consultation.
Individuals can join one of our pre-scheduled trainings to team up and train with peers from other organizations. Click hereto find out which courses are currently scheduled.
The ATHENE Cyber Range is intended for security teams, technical teams and C-level decision makers: