Attack simulations based on applied research.

The Cyber Range platform

The Fraunhofer Cyber Range is the world’s first defense training that combines hands-on training of complex attack simulations in a deeply engineered virtual environment, insights of the latest developments in hacking and technology, and best practices. It facilitates your rapid development of practical cybersecurity skills, enhances your skill set and provides necessary knowledge to tackle future threats successfully.

Our Training Offer

At the core of our training is our Cyber Range platform, a realistic training environment with various scenarios. It was initially developed in Israel by experts in defensive and offensive cybersecurity. The Fraunhofer Cyber Range team will be updating the scenarios continuously leveraging their insights on new attack schemes and patterns. Additionally, we can create customized scenarios, tailored to an organization.

You will encounter a complex network situation facing real life attacks and enhancing your cybersecurity defense skills. Their mission: stop the kill-chain, minimize damages and remove the attack from the system. A web server take down and website defacement are just the warm-up for a variety of scenarios that will be complemented by case study discussions and technology providing valuable insights into malware analyses, current hacking techniques and security of Internet infrastructures.

Our Consulting Services

Do you have any questions about our trainings or would you like advice on how to prepare for a serious cyber attack?

We will be happy to advise you which modules of the Cyber Range training are most beneficial to you.

Are you looking for specific packages for your IT Security team?

We offer exclusive cyber range training courses for companies that improve the security skills of your IT experts and increase the resilience of your organization. Together with you, we determine the competence requirements in your company or your organziation and advise you on how to develop the right skills.

Are you interested in a Cyber Range training, but you do not have your own team?

In our open training courses, we welcome participants from a wide range of organizations and industries to join a group of up to 10 people in detecting and defending against cyber attacks.

Contact us for more information or your customized training

Training modules

Blue Team Basic Training

3-day-training for SOC teams/employees providing you with skills to identify and fend off attacks.

Read more

Blue Team Advanced Training

3-5 day training with more complex scenarios for higher demands on analytical skills and problem-solving competence in coping with real attack situations.

Read more

Advanced real-time attacks combined with C-Level participation

A stress test for the whole business – Whilst your IT team defends against the attackers on your system, your management also tests processes, interfaces and communication channels to the outside and inside.

Contact us

Red Team Training

Think like an attacker to be a world-class defender! This training is a role-play where two teams will take turns to operate as attackers or defenders.

Read more

Blue Team vs. Red Team

Attacking by the Red Team and defending by the Blue Team in real time is the goal of this module.

Read more

Malware Analysis

A deep dive into the analysis of infection routes, creating persistence and removing malware.

Read more

ICS Training

In this course you will learn what to do if Industrial Control Systems/Operational Technology have been compromised.

Read more

Cyber Range training is offered in two languages:

  • German
  • English

Customized Training

You want to customize your training to your specific needs? No problem! Let us create a customized offer for your security team!
Training can be offered as online or face-to-face training.

Contact us

Statements of our Participants

One of the key learnings: No one-man-show - You can't know and you are not able to do everything, but you should combine strengths and compensate for weaknesses together in a team. You need a team that you can rely on. All in all, a very good and instructive training.

Participant in ATHENE Cyber Range Blue Team Basic Training (Information Security Officer of a major city)

The practical relevance was very good. I learnt a lot that can really help me in an attack. I enjoyed the training very much.

Participant in ATHENE Cyber Range Blue Team Basic Training (IT Systems Administrator in the Public Administration of a district)

I really liked the very detailed and realistic training environment and the scenarios. The training gave me new insights into how to proceed in case of incidents and how to prioritize them. I can therefore absolutely recommend the Blue Team training.

Participant in ATHENE Cyber Range Blue Team Basic Training (Systems Administrator in the Public Administration of a major city in Hessia)

Who can train?

Organizations and individuals: Who can train?

The platform supports different attack scenarios and is designed as an realistic company network. Various realistic attacks are offered, which are mainly aimed at employees who are responsible in defending the company against attacks. There are scenarios for beginners and advanced users, as well as special training courses, where the management is involved developing business cases out of those scenarios.

Organizations from all industries, government bodies and research institutes can profit from the ATHENE Cyber Range training.

As an organization, you can book the ATHENE Cyber Range for an exclusive training of your security team. Learn more about our trainings or contact us for a consultation.

Individuals can join one of our pre-scheduled trainings to team up and train with peers from other organizations. Click hereto find out which courses are currently scheduled.

The ATHENE Cyber Range is intended for security teams, technical teams and C-level decision makers:


CERT, NOC and SOC teams and individuals

  • Cybersecurity analysts
  • Cybersecurity defense specialists
  • SOC analysts
  • Threat hunters
  • Intelligence analysts
  • Forensic analysts
  • Incidence response consultants

Advanced attacks combined with C-Level

  • Network administrators
  • Pen tester

C-Level decision makers / lines of business

  • CTO
  • CIO
  • CISO
  • CMO
  • Communications officers
  • Head of sales