cybergrad
The 'CyberGrad' software application was created to train users on the basics of cyber security through interactive lessons and problems. For the project our team considered using a pre-built LMS (Learning Management Software) but instead decided to create a new custom piece of software. This project was a challenge because of the rapid design & development pace - from inception to shipping the final CyberGrad product was completed in just under six months.
The training software allows teachers to assign lessons and quizzes and for students to view and work through those assignments. Both students and teachers also have account dashboards to manage course progression. My responsibilities for the CyberGrad project included:
cybergrad software application #ui #ux #frontend #css #tailwind
My main responsibility in this project was to design new UI/UX features for the cyber security training application. Creating a custom application rather than starting with an out-of-the-box software solution allowed for a higher quality design of the user interface and ultimately a better experience for the user. In addition to assisting with the app's UI/UX, I was responsible for creating the logo and badge sets
cybergrad logo#logo #design #illustrator
As with the entire project, the logo was to be created as an original design. There were many logo ideas submitted by the team, but eventually the name CyberGuard was chosen. However, at the last minute, it was proposed to change the name from CyberGuard to CyberGrad.
cybergrad lesson badge set #graphics #design
For the CyberGrad project I was also tasked with creating a custom set of badges to be used by both instructors and students to track completed course work. Below are some example badges from both the blue and red team badge sets.
Adversarial Tradecraft
The study of the tactics, techniques, and procedures used by cyber adversaries to exploit or compromise computer systems, networks and info
Network Forensics
Discovery and retreival of info surrounding a cyber attack including recording events and finding the source of an attack
Lateral Movement & Persistence
Making sure you can maintain your ability to stay inside the network, and move from one machine to another
Initial Access
Learning the different available paths for gaining access to the target network environment
Privilege & Escalation
Learning the different available paths for gaining access to the target network environment
Recon & Analysis
Preliminary scanning phase of a cyber attack to gather info about potential vulnerabilities that can be exploited
System Containment
In the event of a security risk blue teams perform identification, containment, eradication, and recovery steps to limit threats
User/File/Process Containment
Containing threats at multiple levels and preventing it from spreading