Scalable Network Technologies, a leader in network virtualisation technology for planning, testing, and training, yesterday announced the release of Network Defense Trainer (NDT), a cyber training system. NDT integrates realistic cyber effects into physical/kinetic mission planning and mission rehearsal exercises.
NDT is a live-virtual-constructive (LVC) cyber training system. The US military has been transitioning to LVC integrated architectures over the last several years for all of its operational training programs. The release of NDT marks the first time that cyber training is available in this manner, offering the opportunity to create a single training environment that encapsulates the land, sea, air and space, and cyber domains.
“Both military and commercial environments have used simulation-based training systems for many years with great success, due their inherent flexibility and cost-effectiveness,” stated Dr. Rajive Bagrodia, Scalable Founder and CTO. “More recently, there have been a number of major initiatives to deploy sophisticated cyber ranges to teach ‘cyber warriors’ about the principles and mechanics of cyber-attacks and cyber defense. Our new cyber training system integrates the two disciplines for the first time. Whatever the primary training objectives may be in a training simulator, trainees can now also experience realistic cyber effects as part of that process. This adds an important new dimension of realism and enables trainees to gain vital skills.”
One of the first users of Network Defense Trainer is a major global defence contractor. Their requirement was to add high fidelity cyber effects to a number of existing combat training systems in order to effectively gauge the impact on situational awareness. Trainees are evaluated on their ability to recognize when they are under various forms of cyber-attack and to successfully work around the issues and complete their objectives. The results of a set of exercises are then analyzed to determine if changes to standard operating procedures are warranted.
- Trainees learn to effectively execute their roles in a mission despite being under various types of cyber-attacks
- Network engineers and operations planners can investigate different network configurations and functional procedures for optimizing mission objectives
- Training exercises can include both wired and wireless elements, such as radios, satellites, sensors and mobile data devices, and accurately represents vulnerabilities in the network transport fabric as well as the servers, applications and end-points
NDT is a live-virtual-constructive (LVC) cyber training system. The US military has been transitioning to LVC integrated architectures over the last several years for all of its operational training programs. The release of NDT marks the first time that cyber training is available in this manner, offering the opportunity to create a single training environment that encapsulates the land, sea, air and space, and cyber domains.
“Both military and commercial environments have used simulation-based training systems for many years with great success, due their inherent flexibility and cost-effectiveness,” stated Dr. Rajive Bagrodia, Scalable Founder and CTO. “More recently, there have been a number of major initiatives to deploy sophisticated cyber ranges to teach ‘cyber warriors’ about the principles and mechanics of cyber-attacks and cyber defense. Our new cyber training system integrates the two disciplines for the first time. Whatever the primary training objectives may be in a training simulator, trainees can now also experience realistic cyber effects as part of that process. This adds an important new dimension of realism and enables trainees to gain vital skills.”
One of the first users of Network Defense Trainer is a major global defence contractor. Their requirement was to add high fidelity cyber effects to a number of existing combat training systems in order to effectively gauge the impact on situational awareness. Trainees are evaluated on their ability to recognize when they are under various forms of cyber-attack and to successfully work around the issues and complete their objectives. The results of a set of exercises are then analyzed to determine if changes to standard operating procedures are warranted.