Platform Capabilities

Everything You Need for Cyber Training

LearnBits provides a comprehensive platform for building, deploying, and managing cybersecurity training environments. From visual scenario design to real-time monitoring—all with enterprise-grade security.

Visual Scenario Composer

Build complex training scenarios with our intuitive drag-and-drop topology builder. Add networks, machines, and define attack paths visually without writing code.

CTF Challenge System

Integrated capture-the-flag with dynamic flags, scoring, hints, and real-time leaderboards. Perfect for competitive training and skill assessment.

Real-Time Telemetry

Sub-second latency for critical events. Monitor security patterns like SQL injection, command injection, and brute force attacks as they happen.

Multi-Provider Deployment

Deploy on KVM for on-premises, Docker for development, or AWS/Azure for cloud scale. Same scenario works across all providers.

Browser-Based Terminals

Students access assigned machines through secure, browser-based terminals. No client software required.

Role-Based Access Control

Granular permissions with Range Master, Instructor, and Student roles. Emergency controls for immediate scenario intervention.

Module System

Four module types—Machine, Network, Action, and Objective—let you compose scenarios from reusable building blocks.

Network Isolation

Multi-layer egress enforcement with provider ACLs, virtual firewalls, default-deny routing, and DNS sinkholing.

Live Malware Support

Safely run live malware in the execution plane for realistic training. Multi-layer containment prevents escape.

Immutable Audit Logging

Every action logged with tamper-evident timestamps. 7-year retention default for federal compliance.

Unidirectional Telemetry

Execution assets push telemetry to control plane—never the reverse. Zero control plane credentials in execution environments.

Capability-Based Isolation

Features like clipboard, file transfer, and egress are explicit capabilities—disabled by default, enabled per scenario.

Security by Design

Every architectural decision prioritizes security boundaries, isolation, and containment. The execution plane can be completely compromised and destroyed without affecting the control plane.

  • FedRAMP Moderate/High baseline alignment
  • NIST SP 800-53 controls implemented
  • Immutable, tamper-evident audit logs
  • Zero control plane credentials in execution
  • Multi-layer egress enforcement
  • PIV/CAC authentication support planned
  • SIEM integration (JSON, CEF, Syslog)
  • MITRE ATT&CK threat model mapping

Federal Compliance Alignment

AC
Access Control
RBAC, MFA, Range Master override
AU
Audit
Centralized immutable logs, SIEM export
CM
Config Mgmt
Version control, approval workflows
SC
System Protection
Zero-trust, segmented networks

Note: LearnBits is designed for FedRAMP alignment but is not currently FedRAMP authorized. Customers are responsible for their own authorization processes.

Ready to Transform Your Security Training?

Get in touch to learn how LearnBits can help your organization build realistic, compliant cyber ranges for hands-on training.