Project Ares
DELIVERING ON ITS PROMISE: PROVIDING A LEVEL OF CYBER READINESS TRAINING AND ASSESSMENT UNHEARD OF IN THE COMMERCIAL ENTERPRISE MARKET
Enterprise cybersecurity training and assessmentfor healthcare, financial services, critical infrastructure, transportation and MSSPs companies who place their confidence in Project Ares knowing it provides a ROI that can’t be taught in the classroom or bought with a technical degree.
Customized Missions
Focus on the unique threats faced in business through tailored missions that reflect industry pertinent situations.
Natural Language Processing
Trainees engage in conversation with in-game advisors for guided assistance through exercises to deepen learning.
User Performance Tracking
Consistently assess prospective and existing cybersecurity professionals through user leaderboard metrics and milestones.
Real-world Tools for Real-world Threats
Use cybersecurity tools and techniques applied in the field today to form a company-wide cyber “tool set,” ready to deploy when attacks occur.
Project Ares Cyber Range Demo
Play an introductory scenario and learn how our gamified, cyber range training platform works.
BRING OUT THE CYBERSECURITY HEROES IN YOUR ORGANIZATION
State-of-the-art technology and detailed performance metrics arm CISOs with the benchmarks and progression points needed to strengthen their cybersecurity strategy and align proof-in-performance with key business stakeholders.
INCREASED EMPLOYEE SATISFACTION
Continuous professional development and skill-building opportunities make employees feel valued and purposeful within their teams and for their employer.
MEASURABLE PROOF IN PERFORMANCE
CISOs can finally measure the competencies of their cyber teams to effectively communicate the value of their info security strategy and positive impact on the enterprise.
PROACTIVE APPROACH REDUCES RISK ENVIRONMENT
Staying ahead of evolving threats help teams take proactive measures to protect and defend their organization, strengthening their security environment as a whole.
ENTERPRISE
PROJECT ARES ENTERPRISE: is designed for organizations that want to build and hone cyber skill levels at all levels. The Enterprise version expands upon Project Ares Academy Plus by adding missions: multi-faceted cyber scenarios that require skill integration and strategic thinking. Special features support team play plus player and team coaching.
LEARNING ACTIVITIES
Battle Rooms
Practice makes perfect: Hands-on in a virtualized cyber range. Build your skills in a series of multilevel learning challenges that reinforce cyber skills including Linux, scripting, and forensics.
Cyber Learning Games
Learn concepts: Perfect your understanding of the basics. Master basic cyber security concepts with fun, arcade style games that teach cyber kill chain, ports and protocol, regular expression techniques, and more.
MEDIA CENTER
Cyber resources: The latest info on modern threats. Kickstart your cyber learning with 100+ hours of material in a curated collection of documents, web resources, and videos for all things cyber.
Features
Athena, the AI Advisor for Mission Play
Get help: Need a tutor? Athena is ready to answer your questions. Progress through tight spots in your mission with guidance from Athena. Her suggestions are based on common questions asked across the Project Ares community.
Work Role Learning Paths
Align and identify: Measurable learning objectives are tied to NIST’s NICE framework and work roles to support skill gap analysis. Cyber Defense Infrastructure Specialist, Cyber Defense Analyst, Systems Security Analyst, Threat Warning Analyst, Team Lead
Score & Reports
Evaluate skills: Check out your performance in session playback. Look at the hints used to figure out the activities that need more practice. And use assessment reports to stay on track to complete work role learning paths. Individual reports. Session Playback for Battle Rooms and Missions.
Global Chat
Create connections: Join a community of Project Ares players. Chat about cyber security issues, in-game challenges, and leaderboard stats. Learn together. With other Professional players worldwide.
Experience Points
Level up: Gain experience points while improving cyber security skills. As you progress, collect all the skill badges and earn a coin the first time you complete each mission successfully.
Special Feature for Organizations
Trainer View for Mission Coaching
Observe and Coach: Trainers can observe single or team mission play in real time or via session playback to coach players And because threats are unpredictable, trainers can create realistic challenges by joining live mission plays as an unexpected advisory
Trainer View for Team or Class Performance
Analysis and assess:Manage cross team skill gaps and build ROI with Trainer Tools to access group or class scores, activity data and reports. Drill down to assess individual learning with single player reports and work role learning path data
DiTech Solutions is proud to be a Bronze Partner with Circadence
Project Ares Enterprise + Cyber Defense Bundle
Project Ares Enterprise Gamified Cyber Range with Cyber Defense Course & Labs
Project Ares Enterprise +Network Defense Bundle
Project Ares Enterprise Gamified Cyber Range with Network Defense Course & Labs
Project Ares Enterprise +Network Forensic Bundle
Project Ares Enterprise Gamified Cyber Range with Network Forensic Course & Labs
Project Ares Enterprise +Computer Forensics Bundle
Project Ares Enterprise Gamified Cyber Range with Computer Forensics Course & Labs
Project Ares Enterprise +Linux Fundamentals Bundle
Project Ares Enterprise Gamified Cyber Range with Linux Fundamentals Course & Labs
Project Ares Enterprise +Computer Hacking Forensic Investigator Bundle
Project Ares Enterprise Gamified Cyber Range with Computer Hacking Forensic Investigator Course & Labs
Project Ares Enterprise +Incident Response Handling Bundle
Project Ares Enterprise Gamified Cyber Range with Incident Response Handling Course & Labs
Project Ares Enterprise +Malware Bundle
Project Ares Enterprise Gamified Cyber Range with Malware Course & Labs
Project Ares Enterprise +ICS/SCADA Cybersecurity Bundle
Project Ares Enterprise Gamified Cyber Range with ICS/SCADA Cybersecurity Course & Labs
Project Ares Enterprise +Cyber Threats Bundle
Project Ares Enterprise Gamified Cyber Range with Cyber Threats Course & Labs
Project Ares Enterprise +Penetration Testing Bundle
Project Ares Enterprise Gamified Cyber Range with Penetration Testing Course & Labs
Project Ares Enterprise +Cyber Defense Analyst Protocol Analysis Bundle
Project Ares Enterprise Gamified Cyber Range with Cyber Defense Analyst Protocol Analysis Course & Labs
Project Ares Enterprise +Cyber Defense Analyst Intrusion Detection Bundle
Project Ares Enterprise Gamified Cyber Range with Cyber Defense Analyst Intrusion Detection Course & Labs
Project Ares Enterprise +Cyber Defense Incident Handling Methodology Bundle
Project Ares Enterprise Gamified Cyber Range with Cyber Defense Incident Handling Methodology Course & Labs
Project Ares Enterprise +Cyber Defense Network Attack Analysis Bundle
Project Ares Enterprise Gamified Cyber Range with Cyber Defense Network Attack Analysis Course & Labs
Project Ares Enterprise +Cyber Defense Cybersecurity Bundle
Project Ares Enterprise Gamified Cyber Range with Cyber Defense Cybersecurity Course & Labs
Disable Botnet-Operation Goatherd-Mission 1
A group of hackers have been running a widespread financial scam by using a botnet network. Their activities have triggered a collapse at a National Bank, with thousands of defrauded account holders demanding their deposits from local branches.
Stop Terrorist Financing-Operation Bear Treat-Mission 2
A foreign arms dealer has been financing terrorist attacks to help acquire the last components necessary to build a nuclear fission bomb. This includes the latest attack on a French power plant where the terrorists were able to make off with a nuclear centrifuge which we believe will be used to create a nuclear weapon.
Intercept Attack Plans-Operation Desert Whale-Mission 3
Russia has deployed their new stealth fighter in the middle east. Intelligence estimates suggest that this deployment is a prelude to an imminent strike against US assets in the region. Before we take retaliatory measures, we need to verify the Russian Squadron's mission objectives.
Manipulate Industrial Control System-Operation Mongoose-Mission 9
A video produced for the Taliban shows active training camps preparing more fighters. According to satellite imagery, there is a single water treatment facility providing drinking water to the camps.
Stop Malicious Process-Operation Artic Cobra-Mission 4
A family of Trojans (L e ZeuS byre. Duplex SpyEye) causing a surge of identity thefts has attacked institutions on a global scale. Due to the potentially destabilizing economic impact, the International Cyber Defense Organization has been called upon for assistance.
Protect Financial Institution-Operation Wounded Bear-Mission 5
A new virus has been detected and is spreading globally through financial institutions. The International Cyber Defense Organization (ICDO) has been deployed to all major banks to eradicate this infection.
Respond to Phishing and Exfil-Operation Angry Tiger-Mission 6
The intelligence sharing sites have reported that energy companies are detecting an increasing number of phishing emails that pose cyber-security risks to their Information Technology (IT) and Operational Technology (OT) infrastructure.
Defend Against Web Attack-Operation Bold Hermit-Mission 12
Incidence response teams have been deployed across numerous government agencies, to provide emergency communications for critical operations to defend against attackers. These teams require reliable 24/7/365 communication in order to send and receive critical information pertaining to the terrorist attacks.
Defend ICS/SCADA System-Operation Ocean View-Mission 8
There are reports that the local water authority has just been compromised, putting delivery of clean water for the city at risk. Readings from the water treatment plant's SCADA systems are showing that the chlorine level is 10 times the amount deemed safe for consumption.
Stop Ransomware Attack-Crimson Wolf-Mission 10
A Hospital care in the United Kingdom is in a state of emergency, falling victim to a sophisticated ransomware attack. Records have been encrypted, affecting thousands of patients, including some that are during ongoing treatment.
Power Grid Incident Response-Operation Black Dragon-Mission 13
Intelligence reports that the power grids in the Nation of Formica are being targeted by an advanced cyber threat actor who seeks to demonstrate its global power.
Systems Integrator-Battle Room 1
Player will be given a Kali 2019 box accessible through SSH or VNC terminals provided within the scenario. They will be required to conduct a series of regimented tasks against a router and a Windows 2008 server.
Network Analysis - Battle Room 2
Player will be given a Kali 2019 box accessible through SSH or VNC terminals provided within the scenario. They will be required to conduct a series of regimented tasks against a router and a Windows 2008 server.
Intel Analyst-Battle Room 5
Player will be given a Windows environment that is accessible through SSH or VNC terminals provided within the scenario. They will conduct trials in reconnaissance, information gathering, and analysis using Open Source Intelligence Tools (OSINT)
Linux Basics-Battle Room 6
Player will be given a Kali 2019 environment that is accessible through SSH or VNC terminals provided within the scenario. They will conduct entry level tasks in systems administration, troubleshooting, and access control.
Traffic Analysis-Battle Room 8
Player will be given a Kali 2019 box with multiple network analysis tools installed that is accessible through SSH or VNC terminals provided within the scenario. They will be required to conduct network forensics through analysis of a PCAP.
Forensics-Battle Room 9
Player will be given a Windows 10 environment that is accessible through SSH or VNC terminals provided within the scenario. They will conduct entry level task using forensic tools to provide the necessary evidence needed to support a case of an intrusion.
Scripting Fundamentals-Battle Room 10
Player will be given a Kali 2019 development environment that is accessible through SSH or VNC terminals provided within the scenario. They will be required to conduct a series of tasks using Python 2.7 in order to become familiar with fundamental programming.
System Security Analysis-Battle Room 11
Player will be given a Windows 10 box with network access to Kali, SPLUNK and windows 2012. Your windows workstation is accessible through SSH or VNC terminals provided within the scenario.
Powershell Fundamentals-Battle Room 21
Player will be given a Windows 10 box accessible through SSH or VNC terminals provided within the scenario. They will be required to conduct a series of regimented tasks essential to systems administration operations.
Project Ares
DELIVERING ON ITS PROMISE: PROVIDING A LEVEL OF CYBER READINESS TRAINING AND ASSESSMENT UNHEARD OF IN THE COMMERCIAL ENTERPRISE MARKET
Enterprise cybersecurity training and assessmentfor healthcare, financial services, critical infrastructure, transportation and MSSPs companies who place their confidence in Project Ares knowing it provides a ROI that can’t be taught in the classroom or bought with a technical degree.
Customized Missions
Focus on the unique threats faced in business through tailored missions that reflect industry pertinent situations.
Natural Language Processing
Trainees engage in conversation with in-game advisors for guided assistance through exercises to deepen learning.
User Performance Tracking
Consistently assess prospective and existing cybersecurity professionals through user leaderboard metrics and milestones.
Real-world Tools for Real-world Threats
Use cybersecurity tools and techniques applied in the field today to form a company-wide cyber “tool set,” ready to deploy when attacks occur.
Project Ares Cyber Range Demo
Play an introductory scenario and learn how our gamified, cyber range training platform works.
BRING OUT THE CYBERSECURITY HEROES IN YOUR ORGANIZATION
State-of-the-art technology and detailed performance metrics arm CISOs with the benchmarks and progression points needed to strengthen their cybersecurity strategy and align proof-in-performance with key business stakeholders.
INCREASED EMPLOYEE SATISFACTION
Continuous professional development and skill-building opportunities make employees feel valued and purposeful within their teams and for their employer.
MEASURABLE PROOF IN PERFORMANCE
CISOs can finally measure the competencies of their cyber teams to effectively communicate the value of their info security strategy and positive impact on the enterprise.
PROACTIVE APPROACH REDUCES RISK ENVIRONMENT
Staying ahead of evolving threats help teams take proactive measures to protect and defend their organization, strengthening their security environment as a whole.
ENTERPRISE
PROJECT ARES ENTERPRISE: is designed for organizations that want to build and hone cyber skill levels at all levels. The Enterprise version expands upon Project Ares Academy Plus by adding missions: multi-faceted cyber scenarios that require skill integration and strategic thinking. Special features support team play plus player and team coaching.
LEARNING ACTIVITIES
Battle Rooms
Practice makes perfect: Hands-on in a virtualized cyber range. Build your skills in a series of multilevel learning challenges that reinforce cyber skills including Linux, scripting, and forensics.
Cyber Learning Games
Learn concepts: Perfect your understanding of the basics. Master basic cyber security concepts with fun, arcade style games that teach cyber kill chain, ports and protocol, regular expression techniques, and more.
MEDIA CENTER
Cyber resources: The latest info on modern threats. Kickstart your cyber learning with 100+ hours of material in a curated collection of documents, web resources, and videos for all things cyber.
Features
Athena, the AI Advisor for Mission Play
Get help: Need a tutor? Athena is ready to answer your questions. Progress through tight spots in your mission with guidance from Athena. Her suggestions are based on common questions asked across the Project Ares community.
Work Role Learning Paths
Align and identify: Measurable learning objectives are tied to NIST’s NICE framework and work roles to support skill gap analysis. Cyber Defense Infrastructure Specialist, Cyber Defense Analyst, Systems Security Analyst, Threat Warning Analyst, Team Lead
Score & Reports
Evaluate skills: Check out your performance in session playback. Look at the hints used to figure out the activities that need more practice. And use assessment reports to stay on track to complete work role learning paths. Individual reports. Session Playback for Battle Rooms and Missions.
Global Chat
Create connections: Join a community of Project Ares players. Chat about cyber security issues, in-game challenges, and leaderboard stats. Learn together. With other Professional players worldwide.
Experience Points
Level up: Gain experience points while improving cyber security skills. As you progress, collect all the skill badges and earn a coin the first time you complete each mission successfully.
Special Feature for Organizations
Trainer View for Mission Coaching
Observe and Coach: Trainers can observe single or team mission play in real time or via session playback to coach players And because threats are unpredictable, trainers can create realistic challenges by joining live mission plays as an unexpected advisory
Trainer View for Team or Class Performance
Analysis and assess:Manage cross team skill gaps and build ROI with Trainer Tools to access group or class scores, activity data and reports. Drill down to assess individual learning with single player reports and work role learning path data
DiTech Solutions is proud to be a Bronze Partner with Circadence
Project Ares Enterprise + Cyber Defense Bundle
+Project Ares Enterprise Gamified Cyber Range with Cyber Defense Course & Labs
Project Ares Enterprise +Network Defense Bundle
+Project Ares Enterprise Gamified Cyber Range with Network Defense Course & Labs
Project Ares Enterprise +Network Forensic Bundle
+Project Ares Enterprise Gamified Cyber Range with Network Forensic Course & Labs
Project Ares Enterprise +Computer Forensics Bundle
+Project Ares Enterprise Gamified Cyber Range with Computer Forensics Course & Labs
Project Ares Enterprise +Linux Fundamentals Bundle
+Project Ares Enterprise Gamified Cyber Range with Linux Fundamentals Course & Labs
Project Ares Enterprise +Computer Hacking Forensic Investigator Bundle
+Project Ares Enterprise Gamified Cyber Range with Computer Hacking Forensic Investigator Course & Labs
Project Ares Enterprise +Incident Response Handling Bundle
+Project Ares Enterprise Gamified Cyber Range with Incident Response Handling Course & Labs
Project Ares Enterprise +Malware Bundle
+Project Ares Enterprise Gamified Cyber Range with Malware Course & Labs
Project Ares Enterprise +ICS/SCADA Cybersecurity Bundle
+Project Ares Enterprise Gamified Cyber Range with ICS/SCADA Cybersecurity Course & Labs
Project Ares Enterprise +Cyber Threats Bundle
+Project Ares Enterprise Gamified Cyber Range with Cyber Threats Course & Labs
Project Ares Enterprise +Penetration Testing Bundle
+Project Ares Enterprise Gamified Cyber Range with Penetration Testing Course & Labs
Project Ares Enterprise +Cyber Defense Analyst Protocol Analysis Bundle
+Project Ares Enterprise Gamified Cyber Range with Cyber Defense Analyst Protocol Analysis Course & Labs
Project Ares Enterprise +Cyber Defense Analyst Intrusion Detection Bundle
+Project Ares Enterprise Gamified Cyber Range with Cyber Defense Analyst Intrusion Detection Course & Labs
Project Ares Enterprise +Cyber Defense Incident Handling Methodology Bundle
+Project Ares Enterprise Gamified Cyber Range with Cyber Defense Incident Handling Methodology Course & Labs
Project Ares Enterprise +Cyber Defense Network Attack Analysis Bundle
+Project Ares Enterprise Gamified Cyber Range with Cyber Defense Network Attack Analysis Course & Labs
Project Ares Enterprise +Cyber Defense Cybersecurity Bundle
+Project Ares Enterprise Gamified Cyber Range with Cyber Defense Cybersecurity Course & Labs
Disable Botnet-Operation Goatherd-Mission 1
A group of hackers have been running a widespread financial scam by using a botnet network. Their activities have triggered a collapse at a National Bank, with thousands of defrauded account holders demanding their deposits from local branches.
Stop Terrorist Financing-Operation Bear Treat-Mission 2
A foreign arms dealer has been financing terrorist attacks to help acquire the last components necessary to build a nuclear fission bomb. This includes the latest attack on a French power plant where the terrorists were able to make off with a nuclear centrifuge which we believe will be used to create a nuclear weapon.
Intercept Attack Plans-Operation Desert Whale-Mission 3
Russia has deployed their new stealth fighter in the middle east. Intelligence estimates suggest that this deployment is a prelude to an imminent strike against US assets in the region. Before we take retaliatory measures, we need to verify the Russian Squadron's mission objectives.
Manipulate Industrial Control System-Operation Mongoose-Mission 9
A video produced for the Taliban shows active training camps preparing more fighters. According to satellite imagery, there is a single water treatment facility providing drinking water to the camps.
Stop Malicious Process-Operation Artic Cobra-Mission 4
A family of Trojans (L e ZeuS byre. Duplex SpyEye) causing a surge of identity thefts has attacked institutions on a global scale. Due to the potentially destabilizing economic impact, the International Cyber Defense Organization has been called upon for assistance.
Protect Financial Institution-Operation Wounded Bear-Mission 5
A new virus has been detected and is spreading globally through financial institutions. The International Cyber Defense Organization (ICDO) has been deployed to all major banks to eradicate this infection.
Respond to Phishing and Exfil-Operation Angry Tiger-Mission 6
The intelligence sharing sites have reported that energy companies are detecting an increasing number of phishing emails that pose cyber-security risks to their Information Technology (IT) and Operational Technology (OT) infrastructure.
Defend Against Web Attack-Operation Bold Hermit-Mission 12
Incidence response teams have been deployed across numerous government agencies, to provide emergency communications for critical operations to defend against attackers. These teams require reliable 24/7/365 communication in order to send and receive critical information pertaining to the terrorist attacks.
Defend ICS/SCADA System-Operation Ocean View-Mission 8
There are reports that the local water authority has just been compromised, putting delivery of clean water for the city at risk. Readings from the water treatment plant's SCADA systems are showing that the chlorine level is 10 times the amount deemed safe for consumption.
Stop Ransomware Attack-Crimson Wolf-Mission 10
A Hospital care in the United Kingdom is in a state of emergency, falling victim to a sophisticated ransomware attack. Records have been encrypted, affecting thousands of patients, including some that are during ongoing treatment.
Power Grid Incident Response-Operation Black Dragon-Mission 13
Intelligence reports that the power grids in the Nation of Formica are being targeted by an advanced cyber threat actor who seeks to demonstrate its global power.
Systems Integrator-Battle Room 1
Player will be given a Kali 2019 box accessible through SSH or VNC terminals provided within the scenario. They will be required to conduct a series of regimented tasks against a router and a Windows 2008 server.
Network Analysis - Battle Room 2
Player will be given a Kali 2019 box accessible through SSH or VNC terminals provided within the scenario. They will be required to conduct a series of regimented tasks against a router and a Windows 2008 server.
Intel Analyst-Battle Room 5
Player will be given a Windows environment that is accessible through SSH or VNC terminals provided within the scenario. They will conduct trials in reconnaissance, information gathering, and analysis using Open Source Intelligence Tools (OSINT)
Linux Basics-Battle Room 6
Player will be given a Kali 2019 environment that is accessible through SSH or VNC terminals provided within the scenario. They will conduct entry level tasks in systems administration, troubleshooting, and access control.
Traffic Analysis-Battle Room 8
Player will be given a Kali 2019 box with multiple network analysis tools installed that is accessible through SSH or VNC terminals provided within the scenario. They will be required to conduct network forensics through analysis of a PCAP.
Forensics-Battle Room 9
Player will be given a Windows 10 environment that is accessible through SSH or VNC terminals provided within the scenario. They will conduct entry level task using forensic tools to provide the necessary evidence needed to support a case of an intrusion.
Scripting Fundamentals-Battle Room 10
Player will be given a Kali 2019 development environment that is accessible through SSH or VNC terminals provided within the scenario. They will be required to conduct a series of tasks using Python 2.7 in order to become familiar with fundamental programming.
System Security Analysis-Battle Room 11
Player will be given a Windows 10 box with network access to Kali, SPLUNK and windows 2012. Your windows workstation is accessible through SSH or VNC terminals provided within the scenario.
Powershell Fundamentals-Battle Room 21
Player will be given a Windows 10 box accessible through SSH or VNC terminals provided within the scenario. They will be required to conduct a series of regimented tasks essential to systems administration operations.