The 'CyberGrad' software application was created to train users on the basics of cyber security through interactive lessons and problems. For the project our team considered using a pre-built Learning Management System but instead decided to create a new custom software application. This project was a challenge because of the rapid design & development pace - from inception to shipping the final CyberGrad product was completed in just under six months.
The training software allows teachers to assign lessons and quizzes and for students to view and work through those assignments. Both students and teachers also have account dashboards to manage course progression. The lesson material was developed by My responsibilities for the CyberGrad project included:
The Cybergrad project was developed in collaboration with Red Team training experts k>fivefour who created the red and blue team lesson material. My main responsibility in this project was to design UI/UX features for the cyber security training application. As a team, we decided to create a new custom application rather than start with an out-of-the-box software solution which resulted in a higher quality design and a better experience for the user. In addition to assisting with the app's UI/UX, I was responsible for creating the logo and badge sets
As with the entire project, the logo was to be created as an original design. There were many logo ideas submitted by the team, but eventually the name CyberGuard was chosen. However, at the last minute, it was proposed to change the name from CyberGuard to CyberGrad.
For the CyberGrad project I was also tasked with creating a custom set of badges to be used by both instructors and students to track completed course work. Below are some example badges from both the blue and red team badge sets.
The study of the tactics, techniques, and procedures used by cyber adversaries to exploit or compromise computer systems, networks and info
Discovery and retreival of info surrounding a cyber attack including recording events and finding the source of an attack
Making sure you can maintain your ability to stay inside the network, and move from one machine to another
Learning the different available paths for gaining access to the target network environment
Learning the different available paths for gaining access to the target network environment
Preliminary scanning phase of a cyber attack to gather info about potential vulnerabilities that can be exploited
In the event of a security risk blue teams perform identification, containment, eradication, and recovery steps to limit threats
Containing threats at multiple levels and preventing it from spreading