Stacks Image 599404

Rocheston Cyber Range Sphere


The Cyber Range Sphere is a simulation platform used in RCCE® Level 2 training program. The Cyber Range Sphere helps in assessing incident response processes, and testing new technologies. A Cyber Range Sphere recreates the experience of responding to a cyberattack by replicating the organizational network infrastructure, and the attack itself. Cyber Range Sphere enables hands-on training in a controlled and secure environment.

Rocheston will offer the most interactive cyber network training to equip your IT infrastructure, DevOps and SecOps teams to thwart the emerging cyber threats. By offering a cross-disciplinary training tool combined with an innovative and immersive team building experience, Cyber Range Sphere is an effective method to train all the front-line people for executing a comprehensive security strategy for the present and the future.

As a network becomes bigger, it is crucial to have a cutting-edge security insight and hand-on experience to protect it.

Cyber Range Sphere is an ideal way to:



  • Build a unique Cyber Range Sphere with a select number of networks and security devices
  • Research and thwart real-world threats in a controlled environment
  • Identify and respond to live threats using the advanced Rocheston Rose platform with guidance from experienced instructors.
  • Strengthen threat detection and response skills by exercising against other teams during cyberattack life-cycle scenarios.
  • New cyberattack attack life-cycle scenarios and malware are added by Rocheston Cyberthreat Intelligence Center every week.
  • Hands-on structured platform built in an orchestrated environment with a software-defined topology.
Stacks Image 599410
Stacks Image 599439

How Does the Sphere Work?


The whole concept revolves around a set of rings: Database layer, Application layer, OS layer, MZ, DMZ, Firewall, IDS layer, threat intelligence layer, etc. The nodes are added to these rings using various attack scenarios. The rings and nodes can be turned on / off and The Sphere will reconfigure itself. Simple.

Currently, the Sphere hosts hundreds of VMs with tons of embedded attack vectors. The platform can scale to more than 1,000 VMs.
Stacks Image 599495
Stacks Image 599538
Stacks Image 599517
Stacks Image 599520
Stacks Image 599523
Stacks Image 599526
Stacks Image 599529
Stacks Image 599532
Stacks Image 599535
  • Access a range of virtual machines on Rocheston Cybernetwork, with each domain forming a circle in the Rocheston Cyber Range Sphere.
  • The Cyber Range Sphere can be scaled up to accommodate any number of rings and thousands of virtual machines
  • A wide range of training offerings with multiple attack scenarios in each virtual machine
  • Access a constantly updated catalog of hacking tools from Rocheston Calculus OS
Sophisticated
Build a unique Cyber Range Sphere with a select number of networks and security devices
Research
Research and thwart real-world threats in a controlled environment.
Live Threats
Identify and respond to live threats using the advanced Rocheston Rose platform with guidance from experienced instructors.
Cyberattacks
Strengthen threat detection and response skills by exercising against other teams during cyberattack life-cycle scenarios.
Malwares
New cyberattack attack life-cycle scenarios and malware are added by Rocheston Cyberthreat Intelligence Center every week.
Complex Topology
Hands-on structured platform built in an orchestrated environment with a software-defined topology.

Integrating Rocheston Cyber Range with Market Security Products


Rocheston Cyber Range Sphere is a virtual environment that uses actual network environment as required. They can be operated as a single stand-alone range in a single college, university or organization or can replicate ranges that are accessible across the world. Cyber Ranges are used by the military, government installations and industries. They are provided by the government, private industries and academia.

The Rocheston Cyber Range Sphere can be integrated internally by public and private organizations, or by students who train in the range in the classroom or online from training providers.
Alt image
Stacks Image 599426

Value of Rocheston Cyber Range Sphere Training


  • Teams can collaborate to improve teamwork and capabilities by working in a simulated environment
  • Provide real-time feedback while evaluating cyber capability or while training a team on new organizational and technical environments
  • Test new ideas and solve complex cyber problems in different network environments
  • Performance-based learning and assessment
  • Simulation of on-the-job experience

Simulated Cyber Attack in Sphere