430 likes | 530 Views
Michigan Cyber Range. Introduction. Introduction. Dr. Joe Adams Vice President of Research and Cyber Security 26 years Army Signal Corps Associate Professor at US Military Academy 3 time winner of the NSA’s Inter-Service Academy CDX Senior Member IEEE. Agenda. Who am I?
E N D
Introduction • Dr. Joe Adams • Vice President of Research and Cyber Security • 26 years Army Signal Corps • Associate Professor at US Military Academy • 3 time winner of the NSA’s Inter-Service Academy CDX • Senior Member IEEE
Agenda • Who am I? • Where is the Threat? • How am I at risk? • How to prepare?
Using the Cyber Range • Skills training & maintenance • Classes • Events • Networking • Accessible • Persistent
Classes • 17 Certifications • Pen Testing, Incident Handling, Ethical Hacking • Forensics • Leadership • Disaster Recovery • Classes held: • At Merit or at the customer’s location • Online • Cost includes: • Tuition • Certification Exam • http://www.merit.edu/cyberrange/courses.php
Capture the Flag • Self-Paced • Threads of flags to find • Individual skills • Penetration testing • Forensics • SCADA • Scoring engine • Encourages competition
Force on Force • Paintball • Multiple teams; everyone for themselves • Penetrate system, plant a flag, secure the system • Red vs Blue • Focus on system &service security and continuity • Force on Force • Incident Response • Asynchronous • Red team creates havoc • Blue team diagnoses andrecovers
Alphaville • A persistent training environment • A Network of Things • More realistic than an IP range • Every exercise is a separate, customizable copy of the town and its infrastructure • Heterogeneous environment • Wide variety of operating systems and services • Residents of Alphaville provide “background noise” • Bot nets, rootkits, and backdoors
Using the Cyber Range • Flexible terms & pricing • Pay for what you use • Voucher/Credit system
Questions? • http://www.merit.edu/cyberrange/