Model-driven customisation
Exercises are designed through a model-driven approach, allowing organisations to adapt the scenarios to their specific needs and risks.
- Cyber Range supports training scenarios of tiered difficulty levels (Beginner, Intermediate, Hard), covering a range of skills, from pure Theoretical to Offensive or Defensive.
- Each training scenarios is tailored for a specific work role, following the NIST, NICE, and ECF frameworks, or any other custom work role.
- Additionally, each training scenario can be further enhanced to correspond to specific MITRE ATT&CK Tactics and Techniques, Common Weakness Enumerations (CWEs), Common Vulnerabilities and Exposures (CVEs), or Standards (such as ISO/IEC 27001).
- Sources for the training material covered in the scenario can be entered in the bibliography section.
Support for asset emulation and simulation
The Sphynx Cyber Range supports the emulation and simulation of assets at different layers of the implementation stack, allowing for a comprehensive training experience.
Customisable training scenarios
The platform enables the delivery of cyber range exercises tailored to different assets, and combinations of assets, focusing on specific security and privacy threats, vulnerabilities, and risks.
- Each training scenario involves having the trainee move between states by responding to training events.
- Each training scenario can include questions, information actions, displaying a website or a video, audio, image or PDF file.
- Single and multiple-choice questions can be parametrized in depth by the scenario creator through detailed options such as awarding a different percentage of points for each answer, or even a negative score.
- The scenario creator can fully direct the flow of the training scenario, e.g. direct the trainee to a different question depending on whether the trainee has responded correctly or not.
- The platform allows the scenario creator to define a probability to transition to a target state or even randomizing the sequence of questions to diversify the training among trainees that are training on the same scenario.
Details
Solutions category
Protect
Human Risk Management
Cyber Ranges
Ideal organisation type
Academia
Associations, cooperatives, clusters
Large Enterprise
Other
Public administration
Research Center
Small and Medium Enterprise
Market applications
Aerospace and Defense
Agriculture and Food Industry
Automotive
Construction and Real Estate
Consulting and Professional Services
Education
Energy and Utilities
Environmental Services
Finance and Banking
Healthcare
Hospitality and Tourism
Information Technology (IT)
Legal Services
Manufacturing
Media and Entertainment
Other
Pharmaceuticals and Biotechnology
Public Sector and Government
Retail and E-commerce
Telecommunications
Transportation and Logistics
Deployment mode
Cloud, SaaS, web-based
Pricing model
Custom pricing
Supported languages
English
Greek
Training and support
Free trial available:
No
Support
Email/Help Desk
Available trainings
No