Cyber Ranges and How They Improve Security Training


Cyber ranges were initially developed by government agencies looking to better train their cyber operators on new skills and techniques. To do this, a physical range or ranges were installed on-premise.  Cyber range providers built representations of actual networks, systems, and tools that helped cyber professionals safely train in virtual, secure environments without compromising the agency’s operational network infrastructure.

Today, cyber ranges are used in the cyber security sector to effectively train IT professionals in all industries and help improve defenses against cyberattacks. As technology advanced, cyber range training advanced as well, both in scope and potential. More on this later. 

To schedule a demo of Circadence’s cyber range platform, visit

The National Initiative for Cybersecurity Education reports that cyber ranges provide:

  • An environment where new ideas can be tested safely and teams and work to solve complex cyber problems
  • Performance-based learning and assessment
  • A simulated environment where teams can work together to improve teamwork and team capabilities
  • Real-time feedback
  • Simulate on-the-job experience

Most cyber ranges come in one of two forms: A network environment without pre-programmed content; or a network environment with prescriptive content that may or may not be relevant to a user’s industry. Either cyber range type limits the learner’s ability to develop enriched skill sets beyond what their specific work role may dictate.  


Typically, Cyber range in a boxhas been a collection of virtual machines hosted on an on-premise systemHowever, Circadence has taken the concept of a cyber range in a box and placed it the cloud to better scale cyber training. We lovingly call this CyRaaS, or Cyber Range-as-a-Service, which is integrated into our Project Ares cyber learning platform.

Instead of purchasing a physical set of machines to take up space in a room, virtual machines exist in the cloud and can be accessed by more professionals from any location who want to train persistently and develop cyber skills. The cloud is recognized as one of the most secure spaces to house network components (and physical infrastructure). To ensure cyber ranges spin up environments quickly, deliver the latest training content, and engage users in productive training activitiesaccessing cyber ranges in the cloud is the latest and greatest approach for professionals training in ‘sandbox’ environments. 


By offering cloud based, cyber range in a box services to support cyber training in Project Ares, we are able to deliver more relevant tools and technologies to help professionals gain the best cyber security training possible

The service allows Project Ares to emulate industry-relevant network configurations within learning activities that help trainees practice defensive tactics. Cloud-based cyber ranges also offer hands-on keyboard experience with real world tools and emulated network traffic to reflect the authentic feeling of an actual cyberattack.  

Advances in Artificial Intelligence and machine learning allow us to use cloud ranges to their full potential by tracking patterns in training data to reveal player learning progression with minimal human intervention and oversight. Those patterns are then used to inform the recommendations of an in-game advisor (Athena) that has chat bot functionality so players can get help on cyber range training activities in the platformFurther, cloud-based cyber range training gives security professionals better predictive capabilities when defending and anticipating threats—and according to Microsoft, even  “improve the efficacy of cyber security, the detection of hackers, and prevent attacks before they occur.” 


Not only have we taken physical cyber ranges and placed them in the cloud but we’ve added in elements of gamification to further drive the effectiveness of cyber training. 

With many studies touting the benefits of gamification in learning, it only makes sense that cyber ranges come equipped with sets of gamified elements (e.g. leaderboards, scoring mechanisms, points, badges, levels, etc.). Project Ares has a series of cyber learning games that teach foundational cyber concepts and termsbattle rooms that teach tools, tactics, and procedures, and team-based missions that bring learning full circle when players are tasked with defending against a realistic cyber threat scenario.  This level of cyber learning is done in the cloud so professionals can work together from anywhere in the world to collaborate and defeat modern-day attacks.  

We hope this post helped you understand the true potential of cyber ranges in the cloud and how they are evolving today to automate and augment cyber workforce training and learning.  


Change Behavior, Change Company Cyber Security Culture

For an organization to have a strong cyber readiness strategy, employees within must be willing to recognize potentially harmful cyber behaviors and proactively work to change them. But how can you effectively influence employee behavior when it comes to cyber safety? The answer may surprise you…

It comes down to understanding employee’s psychological faculties first. What influences and motivates employees to actually change how they conduct themselves online, using workplace online systems and platforms? What must an employee think, do, and care about in terms of cyber security to alter behavior? What external factors and trainings can be adopted or modified to facilitate behavioral change?

The answer lies in games! Games are fun and engaging because it appeals to certain psychological drivers within us as human beings. These drivers motivate us toward certain activities. By utilizing gamified, immersive, hands-on cyber training, employees are able to improve their cyber awareness and ultimately change day-to-day actions.

Games can help change behavior because they address several psychological factors that inform and influence learning :

  • Games Provide an Immediate Benefit to Individual Learner – Games typically offer a sense of competition by way of leaderboards, scoring, and team-based play alongside incentives that help players understand “what’s in it for me?” when learning new information.
  • Games Offer a Sense of Accomplishment – Everyone wants to feel like they are making progress and working toward something, eventually culminating in some kind of reward (money, material items, praise, etc). Things like digital badges, “trophies,” level progression, and certificates can drive players to complete challenges and take on additional learning
  • Games Promote Feelings of Ownership – Self-paced games that a player can engage with on his/her own time makes them feel like they “own” Ownership innately motivates people to make their objective at hand, better. Self-paced cyber activities where the user is at the helm of their learning experience increases ownership and empowerment. They don’t have their manager lurking over their shoulder waiting for the next activity to be complete. They can do training on their schedule and at their convenience, when they are ‘ready’ to do it and in the right mindset.
  • Accountability – Utilizing games that involve teamwork instill feelings of acceptance, a ‘we’re in this together’ attitude, and a healthy drive of competition. These activities draw people closer together and make concepts relatable and understandable when they learn together. Training feels less ‘lonely’ and isolated.

Our platform, inCyt, is the perfect tool to help you weave cyber security awareness training into the fabric of your organization. By offering easy to digest information portrayed through interactive games, non-technical employees can gain a deeper understanding of how to stay safe online.

inCyt is an evolving training solution where those with limited cyber knowledge learn basic concepts through cyber themed battles. Currently, inCyt teaches password and email security along with general online safety, with future topics ranging from social media to remote work safety practices and more!

Change behavior to change company culture with inCyt. Not only will your employees feel more empowered to make safe choices online, but your organization will be better protected from looming threats.

To learn more about cyber psychology in the context of building a stronger cyber team and employee base, be sure to check out our on-demand webinar, Time to Reboot: The I/O Psychology of Cyber Security. To learn more about inCyt, schedule a demo today!

Dare to Have Fun! Alleviate the Pain Points of Cyber Security Awareness Training

You know it and we know it: Security awareness training doesn’t have the best reputation Many employees who are required to undergo security awareness training do so under the direction of human resources or a risk and compliance department within their company. Trainings have long been conducted via static PowerPoint presentations, lecture-based talks, online “tutorials”, and through other passive methods that don’t result in the employee retaining much of anything. It merely becomes a box employees check off on their requirements sheet and they move on.

This is not the way cyber security awareness training should be implemented. We know that current trainings like this are ineffective in helping employees learn cyber best practices or, more importantly, change their online behavior for the better. The “learning pyramid”, sometimes referred to as the “cone of learning”, developed by the National Training Laboratory, suggests that most learners only remember about 10% of what they read from textbooks. Whereas, retention is improved when gamification is incorporated into training and learning activities. In fact, according to Talent LMS, 89% of employees believe they’d be more productive if their work was more gamified.

Photo by Zachary Nelson on Unsplash


Don’t believe us? Take a peek at the recent news headlines and industry reports that show human error is still a primary contributor and cause significant company breaches. Employees aren’t empowered with the knowledge to know what to look for in suspicious emails or phone calls, resulting in higher cyber risk for organizations.

And that’s only a few of many incidents that indicate the need to foster more effective security awareness training to truly change digital behavior.

Pain Points of Traditional Security Awareness Training

  1. Actually changing —Getting an employee to go through security awareness training is one thing but actually changing their behavior is another challenge all its own. Training can’t be a ‘one and done’ effort. It must be engaging enough for people to retain learned information so they can recall it when faced with a cyber threat. To do this, security awareness training must have a ‘what’s in it for me?’ component otherwise, there’s no incentive for an employee to do the training at all. Teaching elements like scoring, competition, badges, levels, and ‘digital rewards’ help engage employees so they take training off the ‘must do list’ and onto the ‘want to do list.’
  2. Convincing employees it directly impacts them—If you’ve never been in a car accident, you may be inclined to drive a little faster on the highway, not thinking twice about the repercussions because “an accident will never happen to you.” Wrong. Just because your company may not have been breached (yet) doesn’t mean you’re immune to security awareness training. Unfortunately, the daily onslaught of company breaches making news headlines indicate that the ‘we don’t need security awareness training’ thinking is not only outdated but will leave your organization more vulnerable to an attack. Everyone needs security awareness training if they do any kind of work on an electronic device (whether computer, phone, internet-connected system, etc.)
  3. Perceived protection from technology—It’s quite common to presume that today’s technology has ‘built-in’ security to protect against hackers, and while some devices do offer limited protection, it’s not enough. With as fast as technology is advancing, there’s always a gap in security waiting to be exploited. Spam filters, antivirus software, and firewalls are great, but hackers know the easiest way to get sensitive data and cause disruption is by going through people first. A multi-layered security strategy that places people at the forefront of defense is critical to hardening posture from all angles.

Empower Employees with Fun Security Awareness Learning

Just because the industry has typically conducted security awareness training in a passive manner in the past, doesn’t mean it works—and it certainly doesn’t mean that we have to keep doing it. So let’s flip the script on security awareness training shall we?

We recently debuted inCyt, a security awareness learning tool, at RSA this year. It is an evolving solution designed for non-technical employees to learn cyber foundations and improve online workplace practices. In it, we dare to have fun with security awareness training by simplifying and gamifying the complexity of cyber. We expand the understanding of the threat landscape to non-technical employees who work on business systems by introducing basic concepts through the mind of a hacker. THEN the player is encouraged to demonstrate their learned knowledge in a “final” lesson where the player defends their digital assets from a bot hacker. Games are designed around the cyber attack sequence that outlines the structure of an online threat.

inCyt on a laptop computer

Players with limited cyber knowledge learn basic concepts through cyber themed battles against a bot attacker and the learning becomes ‘sticky’ as information is retained because it’s engaging. Colorful characters, friendly competition, and relevant cyber examples improve security awareness aptitude.

inCyt currently teaches the following security foundations with more on the way!

Phishing & Email Security

  • Understand what phishing is.
  • Understand the impacts of phishing.
  • Identify common indicators of phishing attempts.
  • Identify appropriate countermeasures related to phishing.

Online Safety

  • Understand the risks associated with public internet.
  • Identify proper safety precautions when online shopping.
  • Understand the impact of what and when you post online.

Password Security

  • Understand the importance of strong passwords.
  • Identify best practices when creating passwords.
  • Understand multi-factor authentication.

Future game topics and themes will include: Social Media, Least Privilege, Remote Work / Bring Your Own Device (BYOD), Computer & Software Updates, Response to Potential Attack, Data Value, Preservation & Recovery.

So what do you think? Is it time to change up your security awareness training approach? Perhaps try something new to augment the most vulnerable attack element in your organization: your people.

Schedule a demo of inCyt today to learn more.


Photo by Zachary Nelson on Unsplash
Photo by Jason Leung on Unsplash