'Advanced Cyber Security Training at TCG Cyber Range'

TCG Cyber Range

TCG Digital has established the first cyber range of India that is commercially available. This state-of-the-art cyber range has been set-up to serve Defense Establishments, Indian Security Agencies, Government Departments and enterprises in the Public and Private Sectors.

Like many organizations worldwide, Indian enterprises both in the public and private sectors face an acute shortage of Cyber Warriors with the skills required to defend against cyber terrorism, cybercrime and nation sponsored attacks.

The situation is made worse by the weaknesses and vulnerabilities that continue to pervade critical IT infrastructures — despite a lot of debates, discussions and investments to secure them.

The TCG Cyber Range can help you to develop elite Cyber Warriors who will collaboratively defend against sophisticated cyber-attacks for protecting your critical ICT components connected to networks. The cyber range an also train Cyber Warriors to undertake offensive operations against enemy targets.

The National Cyber Security Policy – 2013 (NCSP) explicitly specifies that India requires "to create a workforce of 500,000 professionals skilled in cyber security through capacity building, skill development, and training."

Cyber Range : Services Offered

Training Events – create cyber warriors by conducting offensive operations (RED TEAM ) against simulated attack targets and defensive operations (BLUE TEAM) to protect critical infrastructure components connected to networks

Product Evaluation – perform head-to-head comparison of next-generation firewalls (NGFWs) and other security devices on your network environment prior to committing investment

Research & Development – create customized malware and evaluate their behavior

Forensic Analysis - understand prior failures and uncover details of cyber-attacks and breaches; evaluate the results of cyber attacks

System Emulation – emulate your networks using a mix of physical and virtual ICT devices (Hybrid Model)

Optimize – firewall and other intrusion prevention systems (IPS) and security devices

Validate – distributed denial of service (DDoS) and other attack

Build – build networks and cloud infrastructures that are resilient to attacks

Cyber Range Engagement Model

Engagement Model : work collaboratively with customers to provide customized solutions specific to their cyber security requirements

  • Encapsulate Machine, OSs & Apps in infrastructure container Create machines with different settings including CPUs, disks, memory, NICs & video cards. Use any operating system
  • Encapsulate Networks in infrastructure container Create networks with different switching, routing and protocols including IPv4/v6, DHCP, SLAAC, RIP, OSPF, and others
  • Encapsulate Storage in infrastructure container Utilize distributed architecture and leverage NFS to access existing storage solutions. Create your own storage containers.
  • Internet-Scale Performance* 80 Gbps application throughput
  • 120M concurrent HTTP sessions
  • 24M new connections per second
  • Real-World Applications; 270+ application protocols
  • Voice, Video, Web, Enterprise Applications, Gaming
  • Mobile
  • Storage workloads
  • Custom applications
  • Real Attacks 36,000 plus live security attacks
  • DDoS and botnet simulation



Col. Pankaj Verma

+91 9428212820

Sudipto Jena

+91 9958110278

Vikash Chauhan

+91 9582248088

Shamsher Bahadur

+91 9836057030

Joydeep Bhattacharya

+91 9830184530