Using the Evolved Cyber Range – Free Webinar

From: IDGA

Using the Evolved Cyber Range to Arm and Train U.S. Warriors to Win Cyber War

This FREE webinar will be on:
Tuesday, April 5, 2011, 2:00 PM – 3:00 PM ET
Presenter: Scott Register

How are military and intelligence organizations such as the U.S. Defense Information Systems Agency (DISA), the U.S. European Command (EUCOM), and Northrop Grumman (U.S. and U.K.) deploying cyber range technology? What are these organizations doing to develop the expertise of personnel and then equipping them with the advanced tools needed to fulfill cyber security missions?

Join BreakingPoint Systems, the global leader in cyber range technology, and learn how U.S. government and military can properly train personnel with the skills to defend against cyber terrorism, espionage, and theft of intellectual property.

Listen to the best practice case studies of DISA, EUCOM, and Northrop Grumman as they use the latest technology and establish a turnkey system to deliver a complete, scalable, and operational cyber range.

Learn how to use technology to simulate Internet-scale cyber war conditions in a controlled environment in order to establish IT certification methods and curriculum needed for assessing, training, and qualifying cyber warrior personnel.

View the Whitepaper

View the Whitepaper

After attending this webinar you will know how to:

  • Deploy and use a modern cyber range machine to create an operationally relevant environment that precisely mirrors the Global Information Grid (GIG), enabling sophisticated simulation of real-world cyber conditions
  • Optimize and harden the resiliency—the performance, stability, and security—of next-generation deep packet inspection (DPI) devices to carry out effective Lawful Intercept programs and related missions
  • Model and research advanced cyber threats including Stuxnet and botnet-driven distributed denial of service (DDoS) attacks
  • Implement a scalable approach for training and certifying cyber warriors in critical Information Assurance (IA), Information Operations (IO), and Mission Assurance (MA) skills.
  • Establish centralized command and control to monitor and manage a distributed network of remote cyber ranges

, ,

Comments are closed.