PAe - helena, the new solution of the scope of CCN-CERT ciberinvestigación cyber threats on the
accesskey _ mod _ content

Helena, the new solution of the scope of CCN-CERT ciberinvestigación cyber threats on the

09 march 2021


ELENA is an innovative complement theoretical training or experience in ciberinvestigación techniques, facilitating the testing of theories learned of a realistic way.

The National Cryptologic centre (Opens in new window) , adscrito al Centro Nacional de Inteligencia, ha desarrollado una nueva solución para facilitar la capacitación de los profesionales en ciberseguridad:  HELENA (Opens in new window) ; a platform that allows users to enter the area of ciberinvestigación and practise techniques, tactics and procedures necessary to carry out this type in prevention and analysis of cyber threats.

This environment offers various scenarios practical and itineraries that simulate real situations of different scenarios, since less technical requiring a greater degree of logic and decision-making to technical simulations in which the user must demonstrate the capacity for collecting information on the operation of cyber threats, processing and enrichment.

Users of ELENA erase the role of the character named CCN-Warrior, representing a ciberinvestigador analysing the conduct of cyber threats operating in digital Fields and will have many practical cases to be resolved. Thus, this platform is presented as a complement to the innovative user theoretical training, facilitating the testing of theories learned in a lab environment developed through digital simulation.

En cuanto a las funcionalidades que ofrece ELENA, destacan las siguientes:

  • Sistema intuitivo, con guías de bienvenida y reglas de uso para los participantes.
  • Estadísticas detalladas, ranking de mejores participantes y seguimiento del desempeño e interés por parte de estos.
  • The learning platform and the terminal of commands are prepared so that anyone can start immersion in the area from your web browser, with all the necessary resources from the date of its registration.
  • Sustained environment, where the user data are trained with a professional surfing the Internet that emulates the real, but they remain at all times within safe limits and isolated from a laboratory practice.

Original source of news (Opens in new window)

  • Security
Subscribe to the youtube channel of OBSAE
Subscribe to the youtube channel of OBSAE