CMD+CTRL Cyber Range Training
CMD+CTRL CYBER RANGE IS THE ONLY AUTHENTIC CYBER RANGE BUILT FOR APPLICATION SECURITY TRAINING.
The CMD+CTRL Cyber Range suite features intentionally vulnerable applications and websites that tempt players to steal money, find out their boss’s salary, purchase costly items for free, and conduct other nefarious acts. Hundreds of vulnerabilities, common to most business applications, lay waiting to be exposed.
Individuals and teams learn how applications are attacked by actively exploiting websites, applications, and mobile apps. Hands-on means higher engagement and retention.
THINK YOU KNOW CYBER RANGES? THINK AGAIN.
Most cyber ranges for networking and Capture the Flag (CTF) environments come with burdens: heavy hardware requirements, configuration challenges, required expertise, inaccessible remotely and have cumbersome manual scoring.ARE YOU READY TO HACK CMD+CTRL CYBER RANGE REAL WORLD ENVIRONMENTS?
AUTHENTIC
Fully featured applications and social engineering components let players “follow their nose” and experience how business logic rules can work for or against them. Vertically-oriented cyber ranges ensure the learning environment resonates. Features actual security exploits (not pre-defined strings), real traffic, user roles, server & database communication.ENGAGING
Real-time scoring, Easter eggs, and other surprises transform players from passive participants to determined competitors.CLOUD-BASED & TURN-KEY
The SaaS-based cyber range for easy remote access. No installs needed – literally launch and play, all you need is a browser. Each player has access to their instance, so there is no disruption due to other player activity.COMPREHENSIVE
Over 500 vulnerabilities cover the majority of the OWASP Top 10/SANS CWE Top 25 + hard to find industry-specific vulnerabilities. From beginner to black diamond – all levels of learners are challenged (even industry veterans!).STRATEGIC DATA & INSIGHTS
Detailed reporting highlights skills and knowledge gaps in application security, measures improvement over time and demonstrates impact and risk reduction.PERPETUALLY CUTTING EDGE
The latest vulnerabilities and new features constantly updated.CMD+CTRL CYBER RANGE TRAINING - REPORTING
SECURITY SKILLS: VALUABLE DATA AND INSIGHTS
The immediate impact of most training efforts is seen at an individual level through increased knowledge, improved retention, and better day-to-day security practices. The shift of improvement from individual to organizational becomes possible as individual data points are gathered and presented in concise and powerful reporting.- Total scores and score distribution
- Dashboard for coaching & event customization
- Vulnerabilities found by difficulty level and type
- Hints used and missed challenges
- Event summaries and recommendations
- Performance mapping to specific training courses
CMD + CTRL CYBER RANGE REPORTS PROVIDE VALUABLE SKILL INSIGHTS REGARDLESS OF TRAINING AND SECURITY MATURITY.
Move beyond the typical “checkbox” mentality of training and explore the real-world capabilities of individuals, teams and entire organizations.
MAPPING OF PERFORMANCE TO FOCUSED TRAINING PLANS
Understanding performance is important, but improving performance by mapping current performance to future tailored training is critical and effective.
IDENTIFICATION OF TALENTS
Most teams have hidden talents just waiting to be found! Hands-on engagements help highlight those talents in ways that traditional methods don’t.
EARLY INDICATORS OF ADDITIONAL TRAINING REQUIREMENTS
Not all team members are created equal and some may need a bit more training than others. The identification of these team members discretely and constructively allows for quicker focus on training and education.
PERFORMANCE AND PARTICIPATION BASELINES
Successful long-term adoption starts with initial measurements. The CMD+CTRL team will help intelligently baseline your team’s participation, performance, and improvement.
TRACKING OF IMPROVEMENT OVER TIME
An improvement over time is the ultimate goal but must be measured to be successful
CMD+CTRL CYBER RANGE IS THE ONLY AUTHENTIC CYBER RANGE BUILT FOR APPLICATION SECURITY TRAINING.
The CMD+CTRL Cyber Range suite features intentionally vulnerable applications and websites that tempt players to steal money, find out their boss’s salary, purchase costly items for free, and conduct other nefarious acts. Hundreds of vulnerabilities, common to most business applications, lay waiting to be exposed.
Individuals and teams learn how applications are attacked by actively exploiting websites, applications, and mobile apps. Hands-on means higher engagement and retention.
THINK YOU KNOW CYBER RANGES? THINK AGAIN.
Most cyber ranges for networking and Capture the Flag (CTF) environments come with burdens: heavy hardware requirements, configuration challenges, required expertise, inaccessible remotely and have cumbersome manual scoring. CMD+CTRL Cyber Range is the opposite. Cloud-based and turn-key, players need only a browser to exploit vulnerabilities, immediately earn points and move up the leaderboard. This live scoring and instant gratification create an engaging learning environment like no other.ARE YOU READY TO HACK CMD+CTRL CYBER RANGE REAL WORLD ENVIRONMENTS?
AUTHENTIC
Fully featured applications and social engineering components let players “follow their nose” and experience how business logic rules can work for or against them. Vertically-oriented cyber ranges ensure the learning environment resonates. Features actual security exploits (not pre-defined strings), real traffic, user roles, server & database communication.ENGAGING
Real-time scoring, Easter eggs, and other surprises transform players from passive participants to determined competitors.CLOUD-BASED & TURN-KEY
The SaaS-based cyber range for easy remote access. No installs needed – literally launch and play, all you need is a browser. Each player has access to their instance, so there is no disruption due to other player activity.COMPREHENSIVE
Over 500 vulnerabilities cover the majority of the OWASP Top 10/SANS CWE Top 25 + hard to find industry-specific vulnerabilities. From beginner to black diamond – all levels of learners are challenged (even industry veterans!).STRATEGIC DATA & INSIGHTS
Detailed reporting highlights skills and knowledge gaps in application security, measures improvement over time and demonstrates impact and risk reduction.PERPETUALLY CUTTING EDGE
The latest vulnerabilities and new features constantly updated.CMD+CTRL CYBER RANGE TRAINING - REPORTING
SECURITY SKILLS: VALUABLE DATA AND INSIGHTS
The immediate impact of most training efforts is seen at an individual level through increased knowledge, improved retention, and better day-to-day security practices. The shift of improvement from individual to organizational becomes possible as individual data points are gathered and presented in concise and powerful reporting. Through a combination of automated reporting dashboards and dedicated Customer Success Managers (CSMs), CMD + CTRL Cyber Range provides a variety of critical reporting at both the individual and group level:- Total scores and score distribution
- Dashboard for coaching & event customization
- Vulnerabilities found by difficulty level and type
- Hints used and missed challenges
- Event summaries and recommendations
- Performance mapping to specific training courses
CMD + CTRL CYBER RANGE REPORTS PROVIDE VALUABLE SKILL INSIGHTS REGARDLESS OF TRAINING AND SECURITY MATURITY.
IMPROVED INDIVIDUAL, TEAM AND ORGANIZATIONAL INSIGHTMove beyond the typical “checkbox” mentality of training and explore the real-world capabilities of individuals, teams and entire organizations.
MAPPING OF PERFORMANCE TO FOCUSED TRAINING PLANS
Understanding performance is important, but improving performance by mapping current performance to future tailored training is critical and effective.
IDENTIFICATION OF TALENTS
Most teams have hidden talents just waiting to be found! Hands-on engagements help highlight those talents in ways that traditional methods don’t.
EARLY INDICATORS OF ADDITIONAL TRAINING REQUIREMENTS
Not all team members are created equal and some may need a bit more training than others. The identification of these team members discretely and constructively allows for quicker focus on training and education.
PERFORMANCE AND PARTICIPATION BASELINES
Successful long-term adoption starts with initial measurements. The CMD+CTRL team will help intelligently baseline your team’s participation, performance, and improvement.
TRACKING OF IMPROVEMENT OVER TIME
An improvement over time is the ultimate goal but must be measured to be successful