Cyber Range

Technology changes rapidly, as do adversary tactics, which requires defenders to continually improve their craft to detect, deter, and defeat system and network intrusions.

    Waiting for an attack to gain those skills in a production environment puts us at a disadvantage. America doesn’t send soldiers into battle without first receiving training on their primary weapon. Every service member trains for many hours at the weapons range as part of their basic training and throughout their career. Today, cyber weapons are the primary weapon for many operations. The operators of these cyber weapons require extensive training on those tools, tactics and techniques as well.

     

    Our Approach

     

    The Centauri Cyber Range makes maximum use of available technologies, such as virtualization and cloud computing, to deliver realistic and relevant cyber training and simulations to cyber operators. Our range supports both large-scale distributed team-based exercises as well as individual proficiency tests. 

    As needed, we deploy infrastructures for testing new software or individual systems, in a closed environment with no potential harm to the live system. We develop scenarios based on real-world activity, allowing cyber operators the opportunity to hone their craft in an environment where learning and skill development is paramount.

    Related Capabilities

    Modeling Simulation and Analysis

    Centauri’s MS&A team focuses on enabling our customers to make data-driven decisions to discover best-value solutions.


    Cyber
    Program

    Centauri identifies, recruits, and retains many of the nation’s most talented cybersecurity professionals.

    Cyber
    Investigations

    Centauri CCIOs have extensive experience applying complex forensic tools in a variety of computer operating systems.

    Reverse
    Engineering

    Our team is experienced in full-stack reverse engineering, from the hardware layer to the application layer.

    Modeling Simulation and Analysis

    Modeling Simulation and Analysis (MS&A) is a group of engineering processes that involves the study of system components, the development of mathematical and physics-based algorithms that can be coded into numerical software models and/or simulators. Modeling and simulation is used to explore solution trade space and evaluate alternatives to provide detailed insights to analytical questions.

    Learn More

    Cyber
    Program

    The digital landscape is quickly becoming the dominant battlefield of the 21st Century. Attacks perpetrated by nation-state actors, cyber criminals, hacktivists, and insider threats all pose a significant risk to an organization's information and information systems. From theft of intellectual property, accidental or intentional information deletion, or data alteration from the latest ransomware strain, organizations need a cybersecurity partner with the knowledge and experience to defend against these asynchronous threats.

    Learn More

    Cyber
    Investigations

    Centauri’s Cyber Counterintelligence Investigators (CCIOs) have extensive experience in traditional counterintelligence investigations, coupled with cyber and digital forensics knowledge, skills, and abilities.

    Learn More

    Reverse
    Engineering

    The Centauri Cyber team is dedicated to solving the most complex cyber and electronic warfare issues, using a combination of software and hardware reverse engineering to understand and overcome mission targets. Using cutting-edge tools and techniques, the team can discover potential vulnerabilities or malicious behavior. Our team also has the ability to leverage uncovered vulnerabilities to develop offensive cyber capabilities to provide vital tools for cyber and electronic warfare.

    Learn More