SOURCE: BreakingPoint Systems

cyber range devices and products

March 22, 2011 10:16 ET

BreakingPoint Introduces Structured Training and War-Gaming Exercises to Prepare Cyber Warriors to Defend Critical Infrastructure

BreakingPoint Combines Information Assurance/Operations Courses and Red-Team Exercises With Compact Cyber Range Devices to Educate Personnel to Defend Critical Infrastructures and Military Networks

AUSTIN, TX--(Marketwire - March 22, 2011) - Government, military and private enterprises face a dangerous shortage of skilled cyber security personnel -- cyber warriors -- who have the expertise required to defend their critical IT infrastructures. BreakingPoint SCOUT (Simulated Cyber Operations and Unified Training) launched today with a clear mission to deliver structured coursework, hands-on cyber range exercises and the war gaming needed to train and assess a ready force of U.S. cyber warriors.

Webcast: Learn How to Deploy the Evolved Cyber Range to Arm and Train Personnel

Engaging in simulated cyber war conditions
"Network security is often viewed as a dark art or voodoo, something that can only be done by a select few experts," said Victor Fernandez, BreakingPoint director of training. "The truth is, when it comes to cyber security, there is no substitute for experience. Proper training, through engaging in simulated cyber war conditions, develops the instincts and skills needed to recognize and react properly to attacks. This requires massive-scale war gaming and placing personnel in the middle of a firestorm. The likes of the Department of Defense, the Joint Forces Command and the U.S. European Command use BreakingPoint's massively scalable cyber range technology. Now, BreakingPoint SCOUT couples our cyber range products with a standardized training curriculum in order to train and arm functional cyber warriors in operations and mission assurance."

Training and arming cyber warriors with BreakingPoint SCOUT curriculum
Developed using battle-ready cyber range devices, BreakingPoint SCOUT introduces students to the fundamentals of Information Assurance, moves them through Information Operations and ultimately moves them into advanced Mission Assurance.

  • BreakingPoint SCOUT - IA: BreakingPoint SCOUT IA curriculum provides comprehensive basic, intermediate and advanced instruction in the architecture, testing, deployment, protection and maintenance of modern networks, data centers and applications.

  • BreakingPoint SCOUT - IO: Upon achieving IA certification, students follow the IO path and gain exposure to the strategy, fundamental concepts, major components and methodologies of both offensive and defensive IO.

  • BreakingPoint SCOUT - MA: Advanced students will progress into MA fundamentals in order to learn the skills necessary to ensure that DoD mission-essential functions continue under all circumstances. This includes mastering MA fundamentals, mission assessment methodology, situational awareness and mission correlation, and continuity of operations planning.

Read more about the BreakingPoint SCOUT curriculum.

Using the evolved cyber range to hone cyber warrior skills
At the core of BreakingPoint SCOUT is a cyber range device powered by the BreakingPoint FireStorm CTM. This product's massive performance capabilities deliver the same conditions found in the world's largest cyber ranges, including those from the Defense Advanced Research Projects Agency's National Cyber Range, the Department of Homeland Security's DETER testbed and other ranges maintained by the defense industrial base. Like other innovations that have been miniaturized and simplified to put vital capabilities into the hands of the masses, the BreakingPoint FireStorm CTM provides this same functionality in a compact and cost-effective device. The BreakingPoint FireStorm CTM allows government organizations to replace costly and ineffective cyber range implementations and provides an ideal device for enterprise businesses to harden their defenses and train their IT professionals.

Powered by BreakingPoint's patented network-processor technology, the BreakingPoint FireStorm CTM delivers substantial application and attack traffic performance gains, and features more than 4,500 live security attacks, more than 150 real-world applications and SSL bulk encryption to 24 Gbps with any cipher. The BreakingPoint FireStorm CTM is supported by the BreakingPoint Application and Threat Intelligence program, which distributes weekly updates of applications and attacks to maintain resiliency in the face of changing conditions. Optional custom application and custom attack tool kits enable researchers to develop and accelerate their own traffic and attacks.

About BreakingPoint
BreakingPoint is the standard by which the world's governments, enterprises and service providers measure and harden the resiliency of their network and data center infrastructures. BreakingPoint's patented network processor architecture powers the world's first and only cyber tomography machines to expose previously impossible-to-detect stress fractures within network and data center infrastructures before they are exploited to compromise customer data, corporate assets, brand reputation and even national security. For more information, visit

Contact Information

  • Contact:
    Kyle Flaherty
    BreakingPoint Systems
    Email Contact