Вернутся на главную старницу

Cyberpolygon

A platform for training IT and IS personnel to react to computer attacks

Red Team

Cyberpolygon will help to conduct training for the Red Team, to improve and polish the skills of testing for information system penetration

Red Team

Cyberpolygon will help to conduct training for the Red Team, to improve and polish the skills of testing for information system penetration

Penetration into APCS (SCADA) segmentsPenetration into internal network segments Finding and exploiting vulnerabilities of the Windows operating system (OS), including server OS and Active DirectoryFinding and exploiting vulnerabilities of web application (based on various frameworks)Finding and exploiting of Linux OS vulnerabilitiesRaising OS privileges and entrenchmentRemoving traces of unauthorized accessBypassing EDR and antivirus protection toolsBypassing EDR and antivirus protection toolsAnti-Forensics

Blue Team

Training at the Cyberpolygon will enable the Blue Team to repel computer attacks in real time and carry out measures to protect information systems

Finding vulnerabilities in the protected IT infrastructureConfiguring OS security policiesManagement of the computer attack detection and prevention system (IDS/IPS)Audit of SIEM system security events and response to IS incidentsConfiguring and monitoring the declared security functions of protection toolsUpdating the OS and software components to eliminate the identified vulnerabilitiesRemoving traces of unauthorized accessBypassing EDR and antivirus protection toolsResponding to automatic computer attacks on the protected segmentForensics

Competitive advantages

Speed
Speed

Automatic orchestration of all stages of infrastructure deployment

Scalability
Scalability

Connection of third-party protection tools

Support
Support

At all stages for any paradigm

Adaptation
Adaptation

Ability to change the IT infrastructure to meet the Customer’s requirements

Efficiency
Efficiency

Independent evaluation of efficiency of the RedTeam and BlueTeam’s performance

Updating
Updating

Adding new modules, ability to change scenarios during cyber drills

Training
Training

Efficient training schemes

TSARKA examination

The TSARKA experts have OSCP, OSWP, OSCE, OSWE, CISA, ISO/IEC 27001 certificates and regularly participate in international conferences, such as PHDays, ZeroNights, Infoforum, CodIB.\n\nThe TSARKA team took 1st and 2nd places in the main competition, The Standoff, at the PositiveHackDays international information security conference from 2017 to 2019.

TSARKA examination

Access and training terms

A cybersecurity course

A training course on cybersecurity, which includes the basics of information security and initial practical skills


Planned training duration: 2 to 3 months

Access to the Cyberpolygon system

Access to the Cyberpolygon system

Upon completion of the training, obtaining access (account) to the CYBERPOLYGON System to consolidate practical skills in the field of cybersecurity

Contact us for more details

Leave request
Contact us for more details