Platform Workflow

From Design to Training in Minutes

LearnBits simplifies the entire cyber range lifecycle. Design your scenario visually, deploy with one click, and start training immediately with real-time monitoring.

1

Design Your Scenario

Use the visual scenario composer to build your training environment. Add networks, machines, and define attack paths with drag-and-drop simplicity.

2

Deploy with One Click

Deploy your scenario to your chosen infrastructure. LearnBits handles provisioning, networking, and isolation automatically.

3

Train Your Team

Students access their assigned machines via browser-based terminals. Real-time telemetry tracks their progress and actions.

4

Analyze Results

Review detailed analytics, CTF scores, and telemetry data. Export reports for compliance and training documentation.

Five Trust Boundaries

LearnBits enforces strict isolation with five primary trust boundaries. The execution plane is assumed hostile—it can be completely destroyed without affecting the control plane.

Control Plane

Trusted

All orchestration, policy enforcement, identity management, and audit logging. Logically and network-isolated from execution.

Scenario ServiceTelemetryAuthAudit Logger
Unidirectional Telemetry

Execution Plane

Assumed Hostile

All compute, network, and storage for running scenarios and malware. Can be completely destroyed without platform loss.

Student Access
Scenario-defined assets only
Instructor Access
Observation interfaces
Range Master
Emergency break-glass controls

Zero Shared Credentials

Control plane credentials never appear in execution environments.

Unidirectional Push

Execution assets push telemetry to control plane—never the reverse.

Complete Destruction

Execution plane can be fully destroyed without affecting platform.

Deploy Your Way

LearnBits is provider-agnostic. Deploy on your infrastructure of choice with the same scenarios working across all providers.

KVM (On-Premises)

Production

Production deployment on your own hardware. Full control over your training environment.

  • Full VM isolation
  • Hardware-level security
  • Air-gapped capable
  • Best for sensitive environments

Docker

Development

Containerized deployment for development, testing, and lighter workloads.

  • Quick setup
  • Low resource overhead
  • Great for dev/test
  • Desktop friendly

AWS / Azure

Cloud

Cloud deployment for scalability and managed infrastructure.

  • Auto-scaling
  • Managed services
  • Multi-region
  • Pay-as-you-go

Hybrid

Enterprise

Combine on-premises control plane with cloud execution for maximum flexibility.

  • Control plane on-prem
  • Execution in cloud
  • Best of both worlds
  • Compliance friendly

Ready to Transform Your Security Training?

Get in touch to learn how LearnBits can help your organization build realistic, compliant cyber ranges for hands-on training.