{"id":2670,"date":"2022-11-15T09:58:58","date_gmt":"2022-11-15T09:58:58","guid":{"rendered":"https:\/\/cyberrange.at\/cyberrange\/"},"modified":"2026-03-10T06:21:43","modified_gmt":"2026-03-10T06:21:43","slug":"cyberrange","status":"publish","type":"page","link":"https:\/\/cyberrange.at\/de\/","title":{"rendered":"Cyberrange"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2670\" class=\"elementor elementor-2670 elementor-471\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-56dbf3b elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"56dbf3b\" data-element_type=\"section\" data-e-type=\"section\" id=\"intro\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-762bd24\" data-id=\"762bd24\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8441420 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8441420\" data-element_type=\"section\" data-e-type=\"section\" id=\"training-center\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b67935a\" data-id=\"b67935a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c6ddb9e elementor-inner-section-10 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c6ddb9e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3f27149\" data-id=\"3f27149\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1de865c elementor-widget elementor-widget-heading\" data-id=\"1de865c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Willkommen im<br>AIT Cyber Range -<br>Training Center<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e1b5758\" data-id=\"e1b5758\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be34ea6 elementor-widget elementor-widget-image\" data-id=\"be34ea6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"680\" height=\"118\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/dark_stripes_1.svg\" class=\"attachment-full size-full wp-image-2636\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-77fbb71 elementor-widget elementor-widget-text-editor\" data-id=\"77fbb71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das AIT Austrian Institute of Technology hat eine einzigartige digitale und hybride Simulationsplattform entwickelt und betreibt in ihren R\u00e4umlichkeiten in Wien ein Trainingszentrum &#8211; die AIT Cyber Range. Die Einrichtung bietet Platz f\u00fcr bis zu vierundzwanzig Teilnehmer*innen. Im Schulungsraum kann mit Hilfe hochwertiger Computerausr\u00fcstung auf die AIT Cyber Range zugegriffen werden. Dar\u00fcber hinaus k\u00f6nnen im Schulungsraum praktische \u00dcbungen unter Verwendung von Ger\u00e4ten f\u00fcr industrielle Kontrollsysteme durchgef\u00fchrt werden. Die fortschrittliche Audio-Video-Einrichtung im Schulungsraum erm\u00f6glicht es den Teilnehmer*innen, flexibel miteinander zu kommunizieren, z. B. k\u00f6nnen die Teilnehmenden ihren Bildschirm auf gro\u00dfen Projektionsfl\u00e4chen mit der gesamten Klasse teilen. Dies kann zur Erleichterung von Gruppendiskussionen genutzt werden. Angesichts der Notwendigkeit, Online-Veranstaltungen und -Teilnehmer unterzubringen, verf\u00fcgt der Schulungsraum \u00fcber Einrichtungen zum Live-Streaming von Video und Audio ins Internet. Neben dem Hauptschulungsraum gibt es eine Vielzahl von weiteren Nebenr\u00e4umen und Platz f\u00fcr Erfrischungen und gesellschaftliche Veranstaltungen. Unser Ziel ist es, eine flexible, professionelle und einladende Umgebung f\u00fcr unsere Teilnehmer*innen an Schulungen und \u00dcbungen zu schaffen.        <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7c42b4c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7c42b4c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0fd4ab3\" data-id=\"0fd4ab3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-87375f6 elementor-widget elementor-widget-video\" data-id=\"87375f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;play_on_mobile&quot;:&quot;yes&quot;,&quot;mute&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-hosted-video elementor-wrapper elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2023\/01\/Cyberrange-Loop_1.mp4\" autoplay=\"\" loop=\"\" muted=\"muted\" playsinline=\"\" controlsList=\"nodownload\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2de2d97 elementor-widget elementor-widget-button\" data-id=\"2de2d97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2024\/01\/DSS_Factsheet_Cyber-Range_Vers3.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Informationsblatt herunterladen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-73af74f\" data-id=\"73af74f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-78f9520 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"78f9520\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f105046\" data-id=\"f105046\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-debffaa elementor-widget__width-auto elementor-widget elementor-widget-html\" data-id=\"debffaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"49.595\" height=\"33.705\" viewbox=\"0 0 49.595 33.705\"><path d=\"M136.2,70.58l33.7-33.705h-15.89l-33.7,33.705Z\" transform=\"translate(-120.307 -36.874)\" fill=\"#5d6c73\"><\/path><\/svg>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8ffb5c elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"c8ffb5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Neueste Nachrichten<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43749aa elementor-grid-2 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"43749aa\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"home-news\" data-settings=\"{&quot;template_id&quot;:1209,&quot;columns&quot;:2,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;_skin&quot;:&quot;post&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-579597b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"579597b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/cyberrange.at\/de\/nachrichten\/\">alle anzeigen ...<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d10c4f elementor-reverse-mobile elementor-reverse-tablet elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d10c4f\" data-element_type=\"section\" data-e-type=\"section\" id=\"scenarios\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-19f3e20\" data-id=\"19f3e20\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0511b58 elementor-widget elementor-widget-heading\" data-id=\"0511b58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber-Range-Szenarien<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e71623f elementor-widget elementor-widget-text-editor\" data-id=\"e71623f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das AIT erforscht die Cybersicherheit der aktuellen und n\u00e4chsten Generation digitalisierter kritischer Infrastrukturen. Im Rahmen dieser Forschung entwickeln wir gemeinsam mit unseren Partnern ein tiefes Verst\u00e4ndnis dieser Umgebungen und der Bedrohungen, denen sie ausgesetzt sind. Dar\u00fcber hinaus beteiligen wir uns an Aktivit\u00e4ten zum Austausch von Informationen \u00fcber Cyber-Bedrohungen, einschlie\u00dflich Forschungsprojekten und Foren, wie dem European Energy ISAC. Aufgrund dieses Wissens erstellen wir fortschrittliche Szenarien f\u00fcr Schulungen und \u00dcbungen, die repr\u00e4sentativ f\u00fcr gesellschaftlich kritische Infrastrukturen sind und Bedrohungsszenarien enthalten, die die immer ausgefeiltere Natur der Cybersicherheitsbedrohung widerspiegeln. Es wurden Beispielszenarien f\u00fcr Versorgungsnetze, Nuklearanlagen, Produktionssysteme und Unternehmensumgebungen durchgef\u00fchrt. Es wurden Bedrohungsszenarien erstellt, die Elemente der fortschrittlichsten Ransomware und gezielte Angriffe auf industrielle Kontrollsysteme enthalten.     <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c220ab6 full-width elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"c220ab6\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-680dd85 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-ucaddon_image_reveal_on_scroll\" data-id=\"680dd85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_image_reveal_on_scroll.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Image Reveal On Scroll -->\n\t\t<link id='uc_ac_assets_file_uc_image_reveal_css_545-css' href='https:\/\/cyberrange.at\/wp-content\/uploads\/ac_assets\/image_reveal_on_scroll\/uc_image_reveal.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Image Reveal On Scroll *\/\n\n#uc_image_reveal_on_scroll_elementor_680dd85 .uc_overlay{\n  \tleft: 0;\n}\n\n#uc_image_reveal_on_scroll_elementor_680dd85 .uc_reveal{\n\ttransition: ease-in-out all 2s;\n}\n\n#uc_image_reveal_on_scroll_elementor_680dd85 img\n{\n  display:block;\n}\n\n<\/style>\n\n<div class=\"uc_image_reveal\" id=\"uc_image_reveal_on_scroll_elementor_680dd85\">\n\t<div class=\"uc_image_reveal_box\">\n      \t          \n\t\t<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/pexels-negative-space-97077-scaled.jpg\" alt=\"\" width=\"100%\"  src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/pexels-negative-space-97077-scaled.jpg\" alt=\"pexels-negative-space-97077\" width=\"2560\" height=\"1707\">\n          \n              \n\t\t<div class=\"uc_overlay iv-jello\"><\/div>\n        \n\t<\/div>\n<\/div>\n<!-- end Image Reveal On Scroll -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2bcd5b0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2bcd5b0\" data-element_type=\"section\" data-e-type=\"section\" id=\"game-maker\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9deed2b full-width\" data-id=\"9deed2b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67fae7b elementor-widget elementor-widget-ucaddon_image_reveal_on_scroll\" data-id=\"67fae7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_image_reveal_on_scroll.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Image Reveal On Scroll -->\n\n<style>\/* widget: Image Reveal On Scroll *\/\n\n#uc_image_reveal_on_scroll_elementor_67fae7b .uc_overlay{\n  \tright: 0;\n}\n\n#uc_image_reveal_on_scroll_elementor_67fae7b .uc_reveal{\n\ttransition: ease-in-out all 2s;\n}\n\n#uc_image_reveal_on_scroll_elementor_67fae7b img\n{\n  display:block;\n}\n\n<\/style>\n\n<div class=\"uc_image_reveal\" id=\"uc_image_reveal_on_scroll_elementor_67fae7b\">\n\t<div class=\"uc_image_reveal_box\">\n      \t          \n\t\t<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/shamin-haky-RIk-i9rXPao-unsplash-scaled.jpg\" alt=\"\" width=\"100%\"  src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/shamin-haky-RIk-i9rXPao-unsplash-scaled.jpg\" alt=\"shamin-haky-RIk-i9rXPao-unsplash\" width=\"2560\" height=\"1440\">\n          \n              \n\t\t<div class=\"uc_overlay iv-jello\"><\/div>\n        \n\t<\/div>\n<\/div>\n<!-- end Image Reveal On Scroll -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c084e2b\" data-id=\"c084e2b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe03d34 elementor-widget elementor-widget-heading\" data-id=\"fe03d34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00dcbungsumgebung<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1771a33 elementor-widget elementor-widget-text-editor\" data-id=\"1771a33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unsere \u00dcbungsumgebung basiert auf einer inhouse entwickelten Software-Suite, die die Planung und Durchf\u00fchrung komplexer Szenarien f\u00fcr alle Beteiligten sp\u00fcrbar vereinfacht. \u00dcber die \u00dcbungsplattform OriGin (vormals \u201eLearners\u201c, entwickelt mit der IAEA) erhalten Teilnehmer*innen einen zentralen Einstiegspunkt und zugleich den Ersatz f\u00fcr ein klassisches \u00dcbungshandbuch: Alle Unterlagen, Anleitungen und Aufgaben sind geb\u00fcndelt an einem Ort verf\u00fcgbar, und der Zugang in die \u00dcbungsumgebung erfolgt direkt \u00fcber den Webbrowser. Zus\u00e4tzlich k\u00f6nnen Theorieeinheiten \u00fcber Webformulare umgesetzt werden, und durch Third-Party-Integrationen lassen sich weitere \u00dcbungstools nahtlos einbinden. Damit eignet sich OriGin nicht nur f\u00fcr technische Hands-on-\u00dcbungen, sondern auch f\u00fcr die Durchf\u00fchrung von Tabletop Exercises.   <\/p><p>Erg\u00e4nzt wird dies durch die Szenario-Engine FlowGin, eine speziell f\u00fcr Cyberrange-Anforderungen optimierte Business-Process-Engine. Sie erm\u00f6glicht das Modellieren und Ausf\u00fchren von Inject- bzw. Einspielungsabl\u00e4ufen, steuert den Szenarioverlauf zentral und reagiert flexibel auf Fortschritt und Entscheidungen der Teilnehmer*innen, um starre, monotone Handlungsstr\u00e4nge zu vermeiden. Dadurch kann die Spielleitung den Ablauf situativ anpassen, Teams gezielt unterst\u00fctzen und die \u00dcbung auch bei unterschiedlichen Geschwindigkeiten oder unerwarteten Entwicklungen konsistent und realit\u00e4tsnah halten.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3f5b0e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b3f5b0e\" data-element_type=\"section\" data-e-type=\"section\" id=\"technologies\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2e51631\" data-id=\"2e51631\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-eb9030d elementor-inner-section-10 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eb9030d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a47a26d\" data-id=\"a47a26d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd4f945 elementor-widget elementor-widget-heading\" data-id=\"dd4f945\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Range Technologien<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3b8bfa8\" data-id=\"3b8bfa8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0c2e8a elementor-widget elementor-widget-image\" data-id=\"c0c2e8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"680\" height=\"118\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/stripes_1.svg\" class=\"attachment-full size-full wp-image-2640\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f89dc8 elementor-widget elementor-widget-text-editor\" data-id=\"5f89dc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Die Architektur der AIT Cyber Range besteht aus drei Systemmodulen, die jeweils einen bestimmten Zweck erf\u00fcllen und nur lose voneinander abh\u00e4ngig sind, um \u00c4nderungen an den zugrunde liegenden Technologien oder der Implementierung so einfach wie m\u00f6glich zu machen. Bei der Implementierung der Range wird gro\u00dfer Wert auf die Verwendung von Open-Source-Technologie gelegt, was die \u00dcbernahme der Technologie und der \u00dcbungen durch unsere Kunden in ihre eigenen Infrastrukturumgebungen unterst\u00fctzt. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-af099a5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"af099a5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-edc8d60\" data-id=\"edc8d60\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4b660e1 elementor-inner-section-10 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b660e1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fbf21cb\" data-id=\"fbf21cb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c8004af elementor-widget elementor-widget-heading\" data-id=\"c8004af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Die Implementierung der zentralen Open-Source-Module der AIT Cyber Range l\u00e4sst sich wie folgt zusammenfassen:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-aa33713 elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"aa33713\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fc7b08f elementor-section-full_width elementor-inner-section-15 elementor-section-height-default elementor-section-height-default\" data-id=\"fc7b08f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-e42ea00\" data-id=\"e42ea00\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-630a6c1 elementor-widget elementor-widget-html\" data-id=\"630a6c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"49.595\" height=\"33.705\" viewbox=\"0 0 49.595 33.705\"><path d=\"M136.2,70.58l33.7-33.705h-15.89l-33.7,33.705Z\" transform=\"translate(-120.307 -36.874)\" fill=\"#5d6c73\"><\/path><\/svg>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf92d6f elementor-widget elementor-widget-heading\" data-id=\"cf92d6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Computer-Plattform<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7e1f78 elementor-widget elementor-widget-text-editor\" data-id=\"e7e1f78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das Herzst\u00fcck jeder Cyber Range ist die F\u00e4higkeit, Systeme zu simulieren und zu integrieren, um komplexe vernetzte Infrastrukturen aufzubauen. Die AIT Cyber Range nutzt daf\u00fcr ein selbst betriebenes OpenStack-Cluster als Compute-Engine, das in weiten Teilen mit einer Standardkonfiguration auf mehreren Ubuntu-basierten Servern und Systemen betrieben wird. K\u00fcrzlich hat das AIT die Kapazit\u00e4t erweitert, indem es einen Cloud-basierten Dienstleister in Anspruch genommen hat, um die Durchf\u00fchrung von \u00dcbungen mit einer gr\u00f6\u00dferen Anzahl von Teilnehmern zu unterst\u00fctzen.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0f0f98 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-html\" data-id=\"d0f0f98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/kvm.png\" alt=\"kvm\">\n<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/openstack.png\" alt=\"openstack\">\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3e7f82b\" data-id=\"3e7f82b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fdaabf3 elementor-widget elementor-widget-html\" data-id=\"fdaabf3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"49.595\" height=\"33.705\" viewbox=\"0 0 49.595 33.705\"><path d=\"M136.2,70.58l33.7-33.705h-15.89l-33.7,33.705Z\" transform=\"translate(-120.307 -36.874)\" fill=\"#5d6c73\"><\/path><\/svg>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0914b7b elementor-widget elementor-widget-heading\" data-id=\"0914b7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Bereitstellung der Infrastruktur<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccd1261 elementor-widget elementor-widget-text-editor\" data-id=\"ccd1261\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das Infrastrukturbereitstellungsmodul ist die Komponente, die zur Erstellung von Testbed-Konfigurationen und deren Orchestrierung auf einer Computing-Plattform verwendet wird. OpenStack verf\u00fcgt \u00fcber die f\u00fcr das Infrastrukturbereitstellungsmodul erforderlichen Funktionen in Form des OpenStack Heat-Projekts. OpenStack Heat w\u00fcrde zwar alles Ben\u00f6tigte bereitstellen, aber die Range verwendet stattdessen das Infrastructure-as-Code-Tool Terraform, da es eine Vielzahl von Computing-Plattformen unterst\u00fctzt und die Definition von wiederverwendbaren komplexen Infrastrukturmodulen erm\u00f6glicht. Aufgrund des Infrastructure-as-Code-Charakters k\u00f6nnen Konfigurationen auch der Versionskontrolle unterliegen und mit Programmcode-Versionierungssystemen (z.B. GIT) gespeichert werden.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0869a6a elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-html\" data-id=\"0869a6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/terraform.png\" alt=\"terraform\">\n<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/terragrunt.png\" alt=\"terragrunt\">\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7c27e60\" data-id=\"7c27e60\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb63f3d elementor-widget elementor-widget-html\" data-id=\"eb63f3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"49.595\" height=\"33.705\" viewbox=\"0 0 49.595 33.705\"><path d=\"M136.2,70.58l33.7-33.705h-15.89l-33.7,33.705Z\" transform=\"translate(-120.307 -36.874)\" fill=\"#5d6c73\"><\/path><\/svg>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bef7c7 elementor-widget elementor-widget-heading\" data-id=\"4bef7c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Software-Bereitstellung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45c4f04 elementor-widget elementor-widget-text-editor\" data-id=\"45c4f04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das Software-Provisioning-Modul wird verwendet, um virtuellen Maschinen auf der Cyber Range Funktionen hinzuzuf\u00fcgen (und zu konfigurieren). Das AIT Cyber Range Software-Provisioning-Modul wird mit dem Konfigurationsmanagement-Tool Ansible implementiert. Ansible bietet AIT die M\u00f6glichkeit, Softwareimplementierungen und -konfigurationen als &#8222;vorlagenf\u00e4higen&#8220; Code zu definieren. Wie Terraform erm\u00f6glicht es auch Ansible, den Code mit sogenannten Ansible Roles zu modularisieren.   <\/p>\n<p>Einen ausf\u00fchrlicheren \u00dcberblick \u00fcber die AIT Cyber Range finden Sie in einem ver\u00f6ffentlichten Artikel.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30f1e79 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-html\" data-id=\"30f1e79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/ansible.png\" alt=\"ansible\">\n<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/packer.png\" alt=\"Packer\">\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2468b9a elementor-section-full_width elementor-inner-section-15 elementor-hidden-mobile elementor-section-height-default elementor-section-height-default\" data-id=\"2468b9a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-559d9d3\" data-id=\"559d9d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-78e3d6c elementor-widget elementor-widget-html\" data-id=\"78e3d6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/kvm.png\" alt=\"kvm\">\n<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/openstack.png\" alt=\"openstack\">\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-bf60814\" data-id=\"bf60814\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-082f02b elementor-widget elementor-widget-html\" data-id=\"082f02b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/terraform.png\" alt=\"terraform\">\n<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/terragrunt.png\" alt=\"terragrunt\">\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6f01fd4\" data-id=\"6f01fd4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4532e00 elementor-widget elementor-widget-html\" data-id=\"4532e00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/ansible.png\" alt=\"ansible\">\n<img decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/packer.png\" alt=\"Packer\">\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-03052f7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03052f7\" data-element_type=\"section\" data-e-type=\"section\" id=\"story\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6d4c0d8\" data-id=\"6d4c0d8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-76d8c23 elementor-inner-section-10 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76d8c23\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-891f232\" data-id=\"891f232\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ad1f96 elementor-widget elementor-widget-heading\" data-id=\"4ad1f96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Zertifikate<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-aad8ecd\" data-id=\"aad8ecd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-74e84e0 elementor-widget elementor-widget-image\" data-id=\"74e84e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"680\" height=\"118\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/stripes_1.svg\" class=\"attachment-full size-full wp-image-2640\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ce0dd8b elementor-inner-section-15 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ce0dd8b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ded304e\" data-id=\"ded304e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-008b559 elementor-widget elementor-widget-image\" data-id=\"008b559\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"572\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/Collaborating-Center-Plaque_AIT-_22-26-1024x732.png\" class=\"attachment-large size-large wp-image-2678\" alt=\"\" srcset=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/Collaborating-Center-Plaque_AIT-_22-26-1024x732.png 1024w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/Collaborating-Center-Plaque_AIT-_22-26-300x214.png 300w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/Collaborating-Center-Plaque_AIT-_22-26-768x549.png 768w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/Collaborating-Center-Plaque_AIT-_22-26-1536x1097.png 1536w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/Collaborating-Center-Plaque_AIT-_22-26.png 1800w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27cd94f elementor-widget elementor-widget-text-editor\" data-id=\"27cd94f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AIT ist das weltweit erste IAEA-Kollaborationszentrum im Bereich der Cybersicherheit f\u00fcr die nukleare Sicherheit in den Mitgliedsstaaten der IAEA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-936aea9\" data-id=\"936aea9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-84cf8de\" data-id=\"84cf8de\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Willkommen imAIT Cyber Range &#8211;Training Center Das AIT Austrian Institute of Technology hat eine einzigartige digitale und hybride Simulationsplattform entwickelt und betreibt in ihren R\u00e4umlichkeiten in Wien ein Trainingszentrum &#8211; die AIT Cyber Range. Die Einrichtung bietet Platz f\u00fcr bis zu vierundzwanzig Teilnehmer*innen. Im Schulungsraum kann mit Hilfe hochwertiger Computerausr\u00fcstung auf die AIT Cyber Range [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":2680,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"rank_math_title":"Cyber Range Training: Professionelle IT-Sicherheit","rank_math_description":"AIT Cyber Range Training in Wien: Realit\u00e4tsnahe Simulationen & Deepfake Detection. IT-Sicherheitstrainings f\u00fcr kritische Infrastrukturen. Jetzt informieren!  ","rank_math_focus_keyword":"Cyber Range Training, IT-Sicherheitstraining, Deepfake Detection","rank_math_seo_score":"","footnotes":""},"class_list":["post-2670","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/pages\/2670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/comments?post=2670"}],"version-history":[{"count":23,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/pages\/2670\/revisions"}],"predecessor-version":[{"id":2874,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/pages\/2670\/revisions\/2874"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/media\/2680"}],"wp:attachment":[{"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/media?parent=2670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}