GUARDIAN CYBER LLC CONSULTING | TRAINING | ASSESSING
01000011 01001001 01000001
CAGE CODE: 8F7A6
Fast | Affordable | Reliable
ISO 27001 and NIST 800-53 Audits
Fully scalable and customizable!
Professional | Agile | Responsive
Discounted CompTia Vouchers
Personalized Tutoring & Training
Globally available 24/7/365!
Guardian Cyber, LLC builds effective training support systems by applying the industry leading ADDIE training model. The ADDIE model follows five steps for instructional design that focus on continuous improvement and proficiency development.
Stage one: ANALYZE. Establish the specifications of the project. Guardian Cyber supports customer requirements with 100% customizable and super affordable cyber ranges where teams can test and hone their offensive and defensive cyber operations skills. The overall objective is to produce skilled and experienced teams with a goal of being able to effectively conduct operational missions in cyberspace. During initial planning, the logistics to include timeline, cost, delivery method, location, and project scope are outlined in the subsequent sections of this document.
State two: DESIGN. Designing your project. Our cyber ranges are designed by highly qualified and experienced experts in offensive and defensive cyber operations training. Working with your teams, we continuously refine the learning objectives and the training environment itself. We provide concept that serve as both storyboard and prototype for the cyber range depicting the notional content related to the exercise and from which the methods of assessment can be developed.
Stage three: DEVELOP. Developing your module. Our production stage commences at least one week prior to the customer's desired "Go Live" training dates. In addition to building the range to your exact specifications, the range will be accessed and operated daily, before (and during) the exercise to provide real data, documents and scenario-enhancing activity. All technology is integrated and the cyber range will be deemed to be in production. Deliverables such as cyber range guides, rules of engagement, and monitoring capabilities will also be completed and provided to the customer.
Stage four: IMPLEMENT. Training and delivery (In-Person / Online). Training will commence according to the customer’s schedule. Guardian Cyber is absolutely flexible and able to adjust the range level of difficulty based on customer feedback with at least a 12-hour notice. At the start of the exercise (STARTEX) training materials and technology included in the cyber range will be active and functioning. Instructions will be provided to the teams and their leadership on how to find, connect and access the range. Guardian Cyber will also provide feedback loops allowing the customer can assess the quality and effectiveness of the training in near real time.
Stage five: EVALUATE. Process and training review. Guardian Cyber will assist the customer in determining if the training was successful or not. We will brief performance metrics such as number of flags captured, amount of "noise" made during breach attempts and exploit methodology, and feedback on offensive cyber techniques, tactics and procedures as observed by our subject matter experts. This feedback will be provided in Observation-Discussion-Recommendation format with the goal of improving future projects and helping the teams further improve their skills and proficiency.
Guardian Cyber has assembled a highly qualified, experienced and certified team of professionals with extensive expertise in both offensive and defensive cyber operations. We work with government, finance, and the private / public corporate sectors, daily. Our experience with red teaming, ethical hacking, penetration testing, cyber security architecture, cyber engineering, analytical and operational security is second to none.
Vouchers are valid for 1 year from the date of purchase.
Guardian Cyber, LLC
Florida USA | Bogota Colombia | Republic of Palau
Copyright © 2019 Guardian Cyber, LLC - All Rights Reserved.