Study real-world data, not example data sets.
The Cyber Warfare Range hosts ongoing cyber warfare activities at all levels of experience. This affords the opportunity for students interested in developing and expanding their forensic skills to evaluate the results of cyber attacks, because a key part of defense is understanding prior failures and uncovering details of cyber attacks and subsequent breaches.
The forensic cases developed at the Cyber Warfare Range are from actual events, not a canned forensic image. Therefore, while most cases have been created by an aggressor following a process, there is always variance in the actual forensic data created. This
CWR offers the following benefits to the forensic technician:
Due to the nature of most of the cyber warfare exercises ongoing at the CWR, students have the opportunity to compare their conclusions with the process of the cyber attack itself. This ability to
For advanced students, the forensic cases developed in the real-world cyber warfare exercises expose the student to a number and variance of cyber attacks that are not easily obtained through employment. By concentrating the resources and knowledge resulting from the real-world cyber warfare exercises, the Cyber Warfare Range accelerates the student from beginner to expert with practical knowledge that can be subsequently utilized in the real world.
Due to the vast amount of malicious cyber activity constantly taking place on our ranges, a constantly up to date and the growing dataset is available. This allows for the training of machine learning models as well as other statistical and analytical techniques.
For those seeking to design and develop forensic tools, or existing vendors of forensic technologies, we encourage your donation and educational materials to the CWR. The CWR offers the opportunity for forensic vendors to obtain practical feedback and comparative data on their technologies. It also allows vendors to work directly with students and future clients.
Cyber Warfare Range LLC: leading in cybersecurity since 2012 is proudly powered by WordPress