
THE ULTIMATE CYBER TRAINING TOOL
The importance of training cannot be overestimated. It offers trainees the opportunity of dealing with real-life situations without endangering the organization's systems.

Each student receives a score based on the time taken to perform each task and the number of errors relative to the rest of the group. The student's final grade reflects the complexity of each task.
TRAINING
It comprises 24 different Cybersecurity Programs, ranging from BASICS to DEFENSE, OFFENSE, and ICS/SCADA.
CLOUD LICENSES
The CYBERIUM ARENA licenses are aimed at colleges, academies, and training centers that need an all-included as-a-service solution.
STAND-ALONE SERVER
The Cyberium Arena Simulator can also be delivered as self-contained hardware or a virtual environment. This option is ideal for organizations that would like to have an unlimited access environment.


SUPPORTED CYBERSECURITY PROGRAMS

There are in total 24 different Training Programs on the Cyberium Arena Simulator that can be used to test skills using Real-Life Cybersecurity Scenarios on the ThinkCyber Cyberium Arena Simulator.

Program durations :
-
XE Basics : 16-20 hours
-
NX Defense : 40 hours
-
ZX Offensive : 40 hours
-
CX ICS/Scada : 16-40 hours

SIMULATOR DASHBOARD
The Cyberium-Arena Simulator dashboard gives the trainer complete view of the overall progress of the participants, when doing a scenario.
SERVER TYPES
Organizations, like governments, academics, and multi-national companies that would like to use the Cyberium-Arena Simulator in their own environment, can acquire the complete server package and do so choosing whether they want to install a stand-alone server in the Cloud or On-Premise. This option can be delivered as self-contained hardware, or a virtual environment.
Standalone Server
(OnPremise or Cloud)

Cloud As-a-Service
(with licenses)


The most demanding organizations around the globe trust the capabilities of the Cyberum-Arena Simulator


THINKCYBER CLOUD LICENSES
Organizations that would like to rely on an As-A-Service modality can acquire the ThinkCyber Cloud Licenses to access and use the Cyberium-Arena Simulator.

Cloud License Programs Particularities:
-
One license is valid for any of the 21 Programs from the XE, NX, and ZX list
-
Minimum of 5 students per class
-
Fully Cloud-based access
-
Language: English (Languages other than English have an additional cost)
-
Access duration on the Cyberium Arena Simulator is for one month
-
Trainers can upload additional labs to the simulator
SPECTO
Specto is the most recent technology that was developed at ThinkCyber. This extremely powerful tool is capable of learning from live attacks that are happening around the globe, in real-time.
What is totally disrupting about Specto, is that it is able to feed all its findings to the Cyberium-Arena Simulator, so that Cybersecurity Professionals could test their skills against the most recent techniques and malwares used by Cyber-Criminals.

To learn more about Specto, do not miss the opportunity to have a look at its product page.

SIMULATOR
Main
Features
Labs
Books
Scenarios
Projects
The labs hold questions and tasks to support the training.
The course books accompany the trainers and students alike in cybersecurity studies.
Provide participants with possible situations from cybersecurity or cyber terrorism to solve.
Students must complete a practical built-in project, produce defense and assault tools.
ABOUT THE SIMULATOR
The CYBERIUM ARENA simulator offers a three-sixty solution, including labs, books, reports, projects, and international certifications preparation. The CYBERIUM is a high-end simulator focused on cybersecurity training issues such as cyber-attacks and operations technology; through these scenarios, participants are trained.
LABS
The labs hold questions and tasks to support the training, and students can track their progress and results at any time. The labs are controlled by the trainer and allow students to perform defense and attack assignments and become more professional.



BOOKS
The coursebooks accompany the trainers and students alike in cybersecurity studies. The books have been adapted to the learning processes and allow the additional student help during and after the training and can be accessed via the simulator.
SCENARIOS
Provide participants with actual past or possible situations from cybersecurity or cyberterrorism to solve. An example of a real-life scenario would be: The police computer system has been attacked. The mission is to identify the attacker, repair the damage, and secure the system against future attacks.


Projects
Students must complete a practical built-in project, reflecting the knowledge they have acquired and their ability to produce defense and assault tools.

