Replica of a real Security Operations Center (SOC), it will allow students to practice as close as possible to real conditions; it will cover both computing (IT) and industrial (OT) environments. The simulator will be at the heart of a complete attack management process: from detection, through containment, eradication and finally remediation.
Although the missions of these two environments, IT and OT, differ, they are now interdependent. The adoption of IT technologies by industrial equipment creates de facto convergence between IT and OT.
If this hook has aroused your curiosity, we invite you to read the rest of the article to find out more.
A simulator, 350sqm, 3 branches
Security Operations Center (SOC) simulator: between detection and attacks
On a daily basis, a SOC detects threats, analyzes them and responds to them by assessing the compliance of technical infrastructures with the cybersecurity rules and policies applicable within the affected organization.
Our simulator reproduces these activities and teaches students to detect threats and implement actions to respond to them.
Beyond threat detection, our simulator offers learners the possibility of creating or reproducing technical infrastructure attacks, whether in the IT or OT field (1). This type of exercise, conducted in a secure simulation environment, is complex, if not impossible to conduct in real conditions, under penalty of causing irreversible damage.
Finally, the simulator is designed to carry out “blue team” against “red team” (2) exercises, in particular by applying the principle of “Capture The Flag” (3). As a team, learners will have to try to prevent an intrusion.
Our network lab is equipped for learners to build, configure and test an IP LAN network. Learners will be able to put into practice the notions of switching, routing, filtering, monitoring, flow management, automation, DNS, DHCP, VLAN. This learning takes place in two stages, a first virtual one to learn and understand and a second physical one for the practical application of technologies and the manipulation of equipment.
Go from theory to practice, thanks to our industrial simulator: PLC programming, segmentation of industrial networks, implementation of various cybersecurity solutions, intrusion tests on OT environments, are all activities that are just waiting you. No limit to your creativity and mistakes, you are free to experiment and make mistakes!
Training accessible to the outside world
These simulators are a true copy of what can be found in companies specializing in the field. They represent a substantial financial and human investment and constitute a key educational support for our training.
Ultimately, our goal is to open this service to as many people as possible – on a “Simulator as a Service” model – with the possibility, for students following training outside our school, to connect remotely to our environment. , via virtual reality headsets. Allowing other students to benefit from the use of this type of equipment at a lower cost, meets our ambition to make cybersecurity accessible to as many people as possible.
We consider our establishment as a huge sandbox allowing not only to acquire new skills, but also and above all to put them into practice. All cybersecurity technologies will be represented within our school, such as IPS/IDS, NAC, EDR, Bastion, PAM (4) etc… to name but a few.
(1) IT (Information Technology) is the information technology and takes care of EIS Enterprise Information Systems while OT (Operational Technology) is the operating technology and takes care of the SII Industrial Information Systems.
(2) These terms describe teams that imitate attackers (hackers) using their techniques (Red Team) and teams that use their skills to defend against them (Blue Team).
(3) Capture The Flag is a competition that consists of exploiting vulnerabilities affecting an environment, so as to break into systems and applications to recover flags (FLAGs), proof of the intrusion.
(4) Autant de termes que vous découvrirez et/ou approfondirez en suivant les programmes de formations de la CSB.