Organizational Training Challenges Today

Evolving cybersecurity threats requires an agile and adept workforce. Defending the network requires hands-on training of complex hardware, software, and network configurations.

When testing and evaluating new software or hardware, providing timely and accurate information to decision makers and program managers is the ultimate objective.

The CMMC Standard requires Licensed Partner Publishers (LPPs) to provide the training materials to Licensed Training Providers (LTPs). Syndicus NACON is in the process of becoming an LTP.

VirtualOnDemand®

VirtualOnDemand is a powerful and highly scalable cyber range engineered to enhance cybersecurity training and testing and evaluation programs.

By using our VirtualOnDemand training platform, our clients realize reduced training costs and IT resource needs. VirtualOnDemand requires only an Internet connection and modern browser.

National Training Laboratories, Bethel Maine.  Also – 1954, Audio-Visual Methods in Teaching, Edgar Dale Dryden Press, New York

VirtualOnDemand is skills-based, so users can maximize their experience in the shortest time.

Bottom line: Higher knowledge and skills retention with Hands On Exercises.

Integration with LMS

The cyber range is bundled with a Learning Management System (LMS) but use of our LMS is optional. The cyber range can integrate with existing Learning Management Systems and ships with an API to integrate into any web-based training platform.

Licensed Partner Publishers (LPPs) working with Syndicus NACON are assigned a private development portal where content can be staged directly in the LMS. The LPP retains their intellectual property and can use the cyber range to provide hands-on exercises.

Security

VirtualOnDemand isolates the training environment to protect production resources. Malware, applications, and devices are isolated in a private cloud from production environments, while having the ability to interact with them.

The virtualized environment does not require special permissions, is separated physically and logically from networks, and can be accessed and fully controlled from both Government Furnished Equipment (GFE) and personal computers without requiring any special security concessions.

Accreditation

VirtualOnDemand deployments have been accredited under the Risk Management Framework (RMF) and have been deployed in classified environments.

More

  • Collaboration Tools – Shoulder Surfing allows instructors to view and interact with a student’s virtual machine. Instructor Sharing allows instructors to broadcast their virtual machines to students for demonstration purposes.

  • Scenario Builder – An easy-to-use interface for creating virtual machines and complex networks.

  • Automated Housekeeping – Automatic, unattended provisioning and booting of the virtual machines, followed by reallocation of the virtual machines back into the resource pool upon completion.

  • Persistence – Users can save an instance of the network so it can be accessed later.

  • Performance-based Scoring Platform – Instructors can monitor student activity in the network in real-time to assess the completion of training objectives.

Ready to Talk

Your Name (required)

Your Email (required)

Subject

Your Message

Industry Resources

Download Our Latest White Paper: Evaluating and Testing of Defensive Cybersecurity Tools and Methods

DOWNLOAD NOW

Name (required)

Email (required)

Company

Phone Number

The Story of VirtualOnDemand

By |March 25th, 2020|Training|0 Comments

The story of VirtualOnDemand (VOD) began at the turn of the century.  In 2000, our country needed a safe place for its service members to create networks to share information that would protect us from [...]