Cyber Readiness Research
• Collection
Publisher
Software Engineering Institute
Topic or Tag
Abstract
Cyber technology is advancing more rapidly now than it ever has before. How can an organization ensure that its cyber workforce is ready to meet real challenges both individually and as a team?
To counter the growing number of threats, cyber operators need to develop their skills in realistic environments that feature compelling scenarios with intelligent adversaries, and they need to experience the pace and pressure of real cyber events so they can learn to work together as effective teams.
The materials collected here represent some of the tools, techniques, research, and open source software developed by the SEI CERT Division’s Cyber Mission Readiness directorate. They range from the CERT cybersecurity workforce development approach to the challenges developed for the President’s Cup Cybersecurity Competition, which the SEI supported from 2019 to 2024.
Collection Items

President's Cup Cybersecurity Competition Challenges
• Software
By The Software Engineering Institute
These challenges were developed by the SEI for the Cybersecurity and Infrastructure Security Agency's President's Cup Cybersecurity Competition, which the SEI supported from 2019 to 2024.
Download
Cubespace President's Cup Cybersecurity Competition Game
• Software
By The Software Engineering Institute
This video game was developed by the SEI and Carnegie Mellon University for the Cybersecurity and Infrastructure Security Agency's President's Cup Cybersecurity Competition, which the SEI supported from 2019 to …
Download
Gameboard
• Software
By The Software Engineering Institute
Gameboard is a flexible web platform that provides game design capabilities and a competition-ready user interface.
Download
TopoMojo Software and Supporting Materials
• Collection
By Software Engineering Institute
TopoMojo is an open source tool developed by the SEI that contains both a lab builder and player so that lab creators can build, share, and deploy labs quickly. Read …
Learn More
Foundry Software and Supporting Materials
• Collection
By Software Engineering Institute
Foundry is a training asset management portal that functions as a hub for training content to help you optimize your use of training assets. In this collection, you can download …
Learn More
Designing Great Challenges for Cybersecurity Competitions
• Blog Post
By Jarrett Booz Josh Hammerstein Matt Kaar
Recently, the Department of Homeland Security (DHS) identified the need to encourage hands-on learning through cybersecurity competitions to address a shortage of skilled cyber defenders. Likewise, in 2019, Executive Order …
Read
Challenge Development Guidelines for Cybersecurity Competitions
• Technical Report
By Jarrett Booz, Leena Arora, Joseph Vessella, Matt Kaar, Dennis M. Allen, Josh Hammerstein
This paper draws on the SEI’s experience to provide general-purpose guidelines and best practices for developing effective cybersecurity challenges.
Read
Self-Assessment in Training and Exercise
• Technical Report
By Dustin D. Updyke, Thomas G. Podnar, John Yarger, Sean Huff
In this report, the authors introduce an approach to performance evaluation that focuses on self-assessment.
Read
Crucible Software and Supporting Materials
• Collection
By Software Engineering Institute
Crucible is a powerful, open source, cyber-simulation framework that delivers cost-effective, scalable, and dynamic virtual environments. Download Crucible or learn more about it in this collection.
Learn More
R-EACTR: A Framework for Designing Realistic Cyber Warfare Exercises
• Technical Report
By Geoffrey B. Dobson, Thomas G. Podnar, Adam D. Cerini, Luke J. Osterritter
R-EACTR is a design framework for cyber warfare exercises. It ensures that designs of team-based exercises factor realism into all aspects of the participant experience.
Read
Foundation of Cyber Ranges
• Technical Report
By Thomas G. Podnar, Geoffrey B. Dobson, Dustin D. Updyke, Bill Reed
This report details the design considerations and execution plan for building high-fidelity, realistic virtual cyber ranges that deliver maximum training and exercise value for cyberwarfare participants.
Read
The CERT Approach to Cybersecurity Workforce Development
• Technical Report
By Josh Hammerstein, Christopher May
This report describes a model commonly used for developing and maintaining a competent cybersecurity workforce, explains some operational limitations associated with that model, and presents a new approach to cybersecurity …
Read
GHOSTS Software and Supporting Materials
• Collection
By Software Engineering Institute
GHOSTS is a non-player character (NPC) orchestration generator developed by the SEI to create realistic NPCs and network traffic for cyber-training simulations. Download the tool or read more about it …
Learn More
Simulating Realistic Human Activity Using Large Language Model Directives
• Technical Report
By Dustin D. Updyke, Thomas G. Podnar, Sean Huff
The authors explore how activities generated from the GHOSTS Framework’s NPC client compare to activities produced by GHOSTS’ default behavior and LLMs.
Read
Using Machine Learning to Increase the Fidelity of Non-Player Characters in Training Simulations
• Blog Post
By Dustin D. Updyke Thomas G. Podnar Geoffrey B. Dobson John Yarger
On November 9, 1979, the North American Aerospace Command’s (NORAD’s) early warning system interpreted a training scenario involving Soviet submarines as an actual nuclear attack on the United States. In …
Read
ML-Driven Decision-Making in Realistic Cyber Exercises
• Podcast
By Dustin D. Updyke, Thomas G. Podnar
Thomas Podnar and Dustin Updyke discuss efforts by the SEI CERT Division to apply machine learning to increase the realism of non-player characters (NPCs) in cyber training exercises.
Listen