Attack simulations based on applied research.

The Fraunhofer Cyber Range is the world’s first defense training that combines hands-on training of complex attack simulations in a deeply engineered virtual environment, insights of the latest developments in hacking and technology, and best practices. It facilitates your rapid development of practical cybersecurity skills, enhances your skill set and provides necessary knowledge to tackle future threats successfully.

The Cyber Range platform

At the core of our training is our Cyber Range platform, a realistic training environment with various scenarios. It was initially developed in Israel by experts in defensive and offensive cybersecurity. The Fraunhofer Cyber Range team will be updating the scenarios continuously leveraging their insights on new attack schemes and patterns. Additionally, we can create customized scenarios, tailored to an organization.

You will encounter a complex network situation facing real life attacks and enhancing your cybersecurity defense skills. Their mission: stop the kill-chain, minimize damages and remove the attack from the system. A web server take down and website defacement are just the warm-up for a variety of scenarios that will be complemented by case study discussions and technology providing valuable insights into malware analyses, current hacking techniques and security of Internet infrastructures.

Contact us for more information or your customized training

Training modules

Blue Team Basic Training

3-day-training for SOC teams/employees providing you with skills to identify and fend off attacks.

Read more

Blue Team Advanced Training

3-5 day training with more complex scenarios for higher demands on analytical skills and problem-solving competence in coping with real attack situations.

Read more

Advanced real-time attacks combined with C-Level participation

A stress test for the whole business – Whilst your IT team defends against the attackers on your system, your management also tests processes, interfaces and communication channels to the outside and inside.

Contact us

Red Team Training

Think like an attacker to be a world-class defender! This training is a role-play where two teams will take turns to operate as attackers or defenders.

Read more

Blue Team vs. Red Team

Attacking by the Red Team and defending by the Blue Team in real time is the goal of this module.

Read more

Malware Analysis

A deep dive into the analysis of infection routes, creating persistence and removing malware.

Read more

ICS Training

In this course you will learn what to do if Industrial Control Systems/Operational Technology have been compromised.

Read more

Cyber Range training is offered in two languages:

  • German
  • English

Customized Training

You want to customize your training to your specific needs? No problem! Let us create a customized offer for your security team!
Training can be offered as online or face-to-face training.

Contact us

Statements of our Participants

One of the key learnings: No one-man-show - You can't know and you are not able to do everything, but you should combine strengths and compensate for weaknesses together in a team. You need a team that you can rely on. All in all, a very good and instructive training.

Participant in Fraunhofer Cyber Range Blue Team Basic Training (Information Security Officer of a major city)

The practical relevance was very good. I learnt a lot that can really help me in an attack. I enjoyed the training very much.

Participant in Fraunhofer Cyber Range Blue Team Basic Training (IT Systems Administrator in the Public Administration of a district)

I really liked the very detailed and realistic training environment and the scenarios. The training gave me new insights into how to proceed in case of incidents and how to prioritize them. I can therefore absolutely recommend the Blue Team training.

Participant in Fraunhofer Cyber Range Blue Team Basic Training (Systems Administrator in the Public Administration of a major city in Hessia)

Our next Trainings

Can be booked as open training for individuals or as in-house training for a team.

Blue Team Basic Training 18.-20.06.2024 max. 10 Read more
Blue Team Basic Training 27.-29.08.2024 max. 10 Read more
Blue Team Basic Training 08.-10.10.2024 max. 10 Read more

Who can train?

Organizations and individuals: Who can train?

The platform supports different attack scenarios and is designed as an realistic company network. Various realistic attacks are offered, which are mainly aimed at employees who are responsible in defending the company against attacks. There are scenarios for beginners and advanced users, as well as special training courses, where the management is involved developing business cases out of those scenarios.

Organizations from all industries, government bodies and research institutes can profit from the Fraunhofer Cyber Range training.

As an organization, you can book the Fraunhofer Cyber Range for an exclusive training of your security team. Learn more about our trainings or contact us for a consultation.

Individuals can join one of our pre-scheduled trainings to team up and train with peers from other organizations. Click hereto find out which courses are currently scheduled.

The Fraunhofer Cyber Range is intended for security teams, technical teams and C-level decision makers:


CERT, NOC and SOC teams and individuals

  • Cybersecurity analysts
  • Cybersecurity defense specialists
  • SOC analysts
  • Threat hunters
  • Intelligence analysts
  • Forensic analysts
  • Incidence response consultants

Advanced attacks combined with C-Level

  • Network administrators
  • Pen tester

C-Level decision makers / lines of business

  • CTO
  • CIO
  • CISO
  • CMO
  • Communications officers
  • Head of sales