top of page

Cyber SandBox Challenge

Public·1 member

SME Security Operations Indicative Challenge

Project Overview

This 8-week project guides a team of 5 participants through the design, deployment, and operation of a comprehensive security operations solution tailored specifically for Small and Medium-sized Enterprises (SMEs) within the Cyber Security Operations Playground. The team will implement an integrated security monitoring and response platform using high-demand open source tools including Wazuh, ELK Stack (Elasticsearch, Logstash, Kibana), Suricata, OpenVAS, and OSSEC.


Team Roles, Competencies, and AI Impact


1. Security Project Lead

Competency 1: Cybersecurity Strategy Development Description: A senior cybersecurity student will develop a comprehensive security strategy (T0127) tailored for an SME environment by conducting organisational risk assessments, identifying critical assets, and creating a roadmap that aligns security controls with business objectives. The strategy will include a phased implementation plan, resource requirements, and measurable security objectives.

Degree of Completion: The strategy will be evaluated based on comprehensiveness (covering all seven phases of the Cyber Security Operations Process Cycle), alignment with…


7 Views

Cyber SandBox Concepts

Motivation

Many education providers struggle to provide insights into the complex operational environments found in industry settings, resulting in graduates whose experiences and competencies are misaligned with the careers and work roles that they aspire to. Additional challenges are posed by the rapid evolution of cyber threats, tactics, techniques, procedures (TTPs) and the pace of technological advances, requiring educators to provide agile, scalable and authentic learning experiences.


What is Cyber SandBox?

Cyber SandBox is a live simulation environment that provides collaborators with the opportunity to build, deploy, configure and simulate both activities and experiences that align to all phase of the Cyber Security Operations Process Cycle.


Cyber Security Operations Process Cycle

Collaborators can explore operations and security workflows that include IT landscaping, vulnerability scanning, application deployment, pen testing, architecture design, aggregation of security data, SIEM tooling, automation, incident response, recovery and much more.


9 Views

Welcome to our group Cyber SandBox Challenge!

10 Views

    About

    Many education providers struggle to provide insights into t...

    bottom of page