Performance and Innovation

A Cyber Test Systems Cyber Range - Cyber Defense Training Center is an infrastructure where you replicate a real environment like a pre-production in order to train and evaluate Information Technician (IT), Network Operations Center (NoC), Security Operations Center (SoC), Cyber Incident Response (CIRT) and Forensic teams working on their ability to execute their Cyber Incident Response Plans (CIRP) against single-vector and multi-vector cyber attack scenarios and campaigns

Who use Cyber Range ?

Who use Cyber Range ?

  • Militaries
  • Governments
  • Defense Integrators
  • Network Equipment Manufacturers
  • Service Providers
  • Enterprises
  • Universities and Polytechnics
  • Science and Technology Research Institution

They all use inter connected hardware or have a significant online presence and are exposed by motivated and well-funded threat. Cyber Range is the solution to test your infrastructure, train your teams and provide preventive and educational exercises.

Components Deployed in Cyber Range

  • Network Traffic Generator
  • Application Traffic Generator
  • TAP and Aggregator Network
  • Packet Broker Switch
  • Router Firewall
  • Next Generation Firewall
  • IPSec VPN Geteway
  • SSL VPN Gateway
  • Wbe Application Firewall (WAF)
  • Cache
  • Transparent and Explicit Proxy
  • Anti-Adwares
  • Anti-Virus
  • Anti-Malwares
  • Anti-Spyware
  • URL Filter
  • Content Filter
  • SMTP Reply
  • Anti-Spam
  • WAN Accelerator
  • Anti-Advanced Persistent Threat (APT)
  • Network Data Loss Prevention
  • QoS DPI
  • Application DPI
  • Load Balancer Anti-DDOS System
  • Anti-Botnet Sytem
  • Lawful Intercept System
  • Data Retention System/Full Packet
  • Capture System
  • Network Monitoring Platform
  • SIEM
  • Desktop End Point Security
  • Mobile End Point Security
  • ICS/SCADA Security Solution
  • Desktop and Laptop
  • Servers
  • Mobile and Tablets
  • IoT Devices
  • ICS/SCADA Devices
  • Civilian and Military Drone

Level 1- Single-Vectors of Cyber Range Attacks Scenarios:

Level 2- Multi-Vectors of Cyber Range Attacks Scenarios:

During Cyber Range, Cyber Test System is able to generate advance type of cyber attack scenarios Multi-Vectors, combination of multiple types of Single-Vectors.

Level 2- Campaign Mode:

Reproduce the behavior of cyber attach media campaign including Malicious Domains, Malicious Websites, Botnet Communications, Web Exploit Kits. Identifying who introduced malware into your system. the aim is to placed tams into the exact environment as during the original campaign.

A Cyber Range is composed of 6 teams:

A Cyber Range is composed of 5 teams:

How to push your training with us ?

In our Cyber Range training, you play one or more roles (defenders or attackers). The rest of the teams are simulated by machines, instructors or by yourself if you wish. The goal is to train all the cyber defense chain in a realistic environment to improve capability of cyber crisis management.

Train your teams against Cyber Attack Threats


A Cyber ​​Range is a training center for cyber defense that allows organizations to increase the skills of their teams in the defense of their network infrastructures. In order to provide an hyperrealistic training environment and to practice the entire chain of cyber defense, the legitimate and malicious traffic is itself realistic and varied, generated from a Network Traffic Generator CTS-NTG, developed by our teams.

Bet on human resources

Equipment alone is not enough ! Combining appliances and human skills to improve the security of your infrastructure.

Improve your skill level

Attack or defend an infrastructure with progressive exercises, in a realistic environment.

Observe the reactions of your teams

Check the teams’ abilities to work together, discuss and make decisions that affect the entire cyber defense chain.

Prevention exercises

Think about the impacts of a major attack on your operations and your business. Be prepared to counter maximum risks.

React against real threats

Launch the greatest variety of realistic cyber-attacks and set up massive performance tests without suffering any adverse effects.

Learn the limits of your infrastructure

Test the resistance of your infrastructure by pushing it to its maximum risks.