<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Building a cyber range in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/9404#M806</link>
    <description>&lt;P&gt;Folks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wondered if anyone had any good advice best practice for someone starting from scratch to build a cyber range for training and research purposes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;</description>
    <pubDate>Mon, 16 Apr 2018 15:56:03 GMT</pubDate>
    <dc:creator>Robert</dc:creator>
    <dc:date>2018-04-16T15:56:03Z</dc:date>
    <item>
      <title>Building a cyber range</title>
      <link>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/9404#M806</link>
      <description>&lt;P&gt;Folks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wondered if anyone had any good advice best practice for someone starting from scratch to build a cyber range for training and research purposes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 15:56:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/9404#M806</guid>
      <dc:creator>Robert</dc:creator>
      <dc:date>2018-04-16T15:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: Building a cyber range</title>
      <link>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/9439#M807</link>
      <description>&lt;P&gt;Robert,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Building a “Cyber Range” can be simple or complex depending on what you want to do.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For a Red-Team Attack Range&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;To get started, the most basic range can be a computer running MetaSploitable images in a handful of VMs:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=orYbXHm_UXY" target="_blank"&gt;https://www.youtube.com/watch?v=orYbXHm_UXY&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To add infrastructure, you can create virtual network infrastructure devices by running the Cisco IOS instances inside VMware:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=MtQ2XRCv4u8" target="_blank"&gt;https://www.youtube.com/watch?v=MtQ2XRCv4u8&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For a Blue Team Defense Range&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;You could start with the HoneyNet Project and add nodes to participate.&amp;nbsp; Pretty much you’re running live systems with Sebek or something similar to dump off live interactions for you to watch or replay.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ukessays.com/dissertation/examples/information-technology/honeynet.php" target="_blank"&gt;https://www.ukessays.com/dissertation/examples/information-technology/honeynet.php&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An interesting alternative would be to try to run MetaSploitable systems with Sebek running to watch people on intentionally vulnerable machines.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;Eric B.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Apr 2018 14:23:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/9439#M807</guid>
      <dc:creator>Baechle</dc:creator>
      <dc:date>2018-04-17T14:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Building a cyber range</title>
      <link>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/9596#M812</link>
      <description>&lt;P&gt;Thanks I came across the Open Cyber Challenge Platform (OCCP) which looks interesting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://opencyberchallenge.net/wiki/UserGuide" target="_self"&gt;Open Cyber Challenge&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Apr 2018 08:07:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/9596#M812</guid>
      <dc:creator>Robert</dc:creator>
      <dc:date>2018-04-22T08:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: Building a cyber range</title>
      <link>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/53272#M5924</link>
      <description>&lt;P&gt;&lt;A title="What is example.com" href="https://example.com/" target="_blank" rel="noopener"&gt;https://example.com/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2022 15:15:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/53272#M5924</guid>
      <dc:creator>jameseirvingi</dc:creator>
      <dc:date>2022-09-12T15:15:38Z</dc:date>
    </item>
    <item>
      <title>Re: Building a cyber range</title>
      <link>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/53375#M5928</link>
      <description>&lt;P&gt;HI All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could also review current ones, and see how they run them?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ibm.com/services/security-operations-center" target="_blank"&gt;https://www.ibm.com/services/security-operations-center&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://newsroom.ibm.com/2022-02-23-New-IBM-Cybersecurity-Hub-to-Help-Asia-Pacific-Organizations-Build-Cyber-Resiliency" target="_blank"&gt;https://newsroom.ibm.com/2022-02-23-New-IBM-Cybersecurity-Hub-to-Help-Asia-Pacific-Organizations-Build-Cyber-Resiliency&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or if you are lucky hire yourselves a truck with a Command Center?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2022 21:38:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/53375#M5928</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2022-09-14T21:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: Building a cyber range</title>
      <link>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/59556#M6196</link>
      <description>&lt;P&gt;In recent years, we've seen a rise in high-profile cyber-attacks on law firms. In 2016, the Panama Papers leak, which exposed confidential information of high-profile clients of a Panamanian law firm, made headlines across the world. This is just one example of the type of damage that can be done if a law firm's &lt;A href="https://cybersecuritydubai.ae/" target="_blank" rel="noopener"&gt;Cybersecurity uae&lt;/A&gt; is breached.&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2023 12:16:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Building-a-cyber-range/m-p/59556#M6196</guid>
      <dc:creator>miltonwhite</dc:creator>
      <dc:date>2023-05-30T12:16:21Z</dc:date>
    </item>
  </channel>
</rss>

