Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

● NCP- NICE Challenge Project ● VM- Virtual Machine ● VMRC- Virtual Machine Remote Console ❖ NICE Framework- This is shorthand for the NICE Cybersecurity Workforce Framework. ❖ Webportal- The web appl

Hello friends this is the step by step guidance to work on task these are not the questions don’t be panic ./

● NCP- NICE Challenge Project

● VM- Virtual Machine

● VMRC- Virtual Machine Remote Console

❖ NICE Framework- This is shorthand for the NICE Cybersecurity Workforce Framework.

❖ Webportal- The web application at which is where NCP

users log in to interact with NCP content and services.

❖ Player- A NCP user which performs challenges; often a student.

❖ Curator- A NCP user which adds players, creates assignments, and reviews challenge

attempts; often a professor.

❖ Environment- A defined set of VM images, configurations, and extended context. It is

designed to create a realistic set of systems, networks, and users which support a fictitious

organization with a defined purpose.

❖ Challenge- A defined scenario, based on a NICE Framework T ask from the perspective of a

NICE Framework Work Role. Often includes a business scenario, meeting chat, and checks.

Each challenge is designed to work within a specific environment.

❖ Workspace- A live environment assigned to a user for the purpose of attempting challenges.

❖ Assignment- A time window, defined by a Curator, in which a set of users may schedule

workspaces or have workspaces scheduled for them for the purpose of performing challenges.

❖ Check- A monitored state, condition, or event within a challenge usually correlated with a

challenge objective.● Accessing an Active Workspace

○ Workspaces become available to players at approximately 3:00 AM (Pacific Time) on their

designated start date. Once a workspace is available, players will see a button labeled “Open

Workspace”

, which they can click on to continue onto challenge selection and deployment.

Workspaces expire at 11:59 PM (Pacific Time) on their designated end date, at which point any

challenge attempts in progress will be submitted automatically.

● Scheduling a Workspace

○ Players must be added to a Player-Scheduled Assignment before they may schedule a

workspace for themselves. Alternatively, players may have workspaces scheduled for them by

their curator. If a player has an assignment that is pending workspace scheduling, the words

“Not Scheduled” will appear in red under the assignments “Workspace Start Date” and

“Workspace End Date” columns. Selecting the green button labeled “Schedule Workspace” will

navigate them to the Workspace Scheduling page.

○ During assignment creation, curators specify a date range within which they will allow players to

schedule workspaces for themselves. This date range is referred to as the Assignment Phase.

On the Workspace Scheduling page, players are prompted to select a date range within the

Assignment Phase during which they would like to gain access to a workspace. 

Starting a Challenge Using the Webportal

● Selecting a Challenge

○ Once inside of an active workspace for the first time, players are presented with a sortable list of

available challenges with two available action buttons. The “View” button displays expanded

challenge information and the “Deploy” button will deploy that challenge onto the current

workspace.

○ This list is organized by a variety of useful information including the following…

■ Type- At this time there are 3 different types of challenges. T echnical, which is a

challenge where the player generally needs to alter (i.e. install/update software, fix

issues, etc) the VMs within the environment in order to reach a desired end state.

Hybrid, which is a challenge where the player observes and analyzes the state of the

VMs within the environment and writes a report/policy as the primary deliverable. Threat

Sandbox, where the player is educated about a recent threat and encouraged to

experiment with it in the environment.

■ Work Role- This field comes directly from the NICE Framework and is what the

challenge is mapped to/designed from in terms of content.

■ Challenge Title- The challenge’s name.

■ Difficulty- The relative difficulty of the challenge.

■ Time- The relative time it should take to complete the challenge.

4■ OS (Operating System)- The main operating system used to complete the challenge.

This does not, however, mean that the challenge is limited to that operating system

completely.

● Understanding Challenge Details

○ When reviewing challenges, the top level (what is displayed in the list) information is only to help

players find what they are looking for, in general. More important details can be found below this

layer, they become visible once the “View” action is used. The various sections under the

“Challenge Details” tab are listed and explained below…

■ Framework Category, Task/Challenge Number, Specialty Area, Work Role, & Task

Description- These fields come directly from the NICE Framework and are what the

challenge is mapped to/designed from in terms of content.

■ Scenario- A brief business scenario written to give a realistic take on how this challenge

could manifest using real world context.

■ Additional Information- Extra information that will aid in the completion of a challenge.

Often this section includes important details that are required to complete a challenge

properly.

● Understating Known Issues

○ The tab labeled “Known Issues” can be clicked to reveal information about known issues related

to the selected challenge. This section will display a detailed description of the issue along with

any known workarounds and the potential impact the issue may pose to the challenge

submission report.

● Challenge Deployment

○ Challenge deployment, on average, takes between 5-10 minutes once the deployment request  leaves the queue. However, some challenges take longer to deploy than others. In the cases  that the challenge will take longer than 10 minutes to deploy the average deployment time is

listed in the “Additional Information” section of the “Challenge Details” tab.

○ After clicking “Deploy”

, players will be presented with the Meeting Chat interface. During this

phase, players will witness a meeting take place among fictitious colleagues which will provide

valuable details regarding the tasks at hand.

○ Once the challenge has finished deploying, the progress bar at the bottom of the screen will be replaced by a button that reads “Begin Challenge”

Known Issues Reminder

○ Players will be reminded of any known issues related to any particular challenge once the meeting has concluded.

Details of the known issue, along with workarounds and potential impact on checks, will be listed in a gray chat bubble sent from the NICE Challenge Dev T eam.

● Returning to Challenge Selection After Deployment

○ If players wish to select/deploy a new challenge they will need to end the current challenge

attempt. This can be done by selecting the “Documentation” tab within the active workspace,

providing written documentation, and using the green button labeled “Submit Challenge

Attempt” located on the top right of the screen.

■ Important Submission Note- If players start any challenge and need/want to end the

challenge attempt, that challenge attempt will be recorded. All challenge attempts are

recorded and sent to the curator for assessment as submissions.

Performing a Challenge Using the Webportal

● Gathering Information from Meeting Chat on the Webportal

○ Once a challenge has started to deploy onto an active workspace the Meeting Chat animation

will display VERY important information, often CRITICAL to the completion of the challenge.

After the meeting animation has concluded, this information can be reviewed by selecting the

“Meeting Notes” tab. Players should review all of these communications carefully at the

beginning of each challenge.

● Understanding & Tracking Checks on the Webportal

○ After reviewing the challenge’s meeting chat, the second thing a player should review are the

challenge’s checks. T echnical challenges often have many checks, Hybrid challenges often

have none, and Threat Sandboxes often have one which is used to indicate if the threat is still

active or not. There are multiple fields in the check section that have the following types of data

in them…

■ Status- This field will show either a red (denoting an incomplete objective), yellow

(denoting an obstructed check), a green (denoting a complete objective), and a grey

? (denoting an unchecked objective).

■ Check Description- This field displays text related to the check, usually a brief

description of what the check is looking for.

■ Status Info- This field will show extended status information relating to a check’s status.

■ Last Changed- This field shows the last time the check status changed. This is not to

be confused with when a check was last run. Checks generally run every 60 seconds

unless otherwise stated in the check description.

○ When doing a technical challenge the main objective is reached when all the checks are

reporting back a green in the status field . be confused with when a check was last run. Checks generally run every 60 seconds

unless otherwise stated in the check description.○ When doing a technical challenge the main objective is reached when all the checks are

reporting back a green in the status field.

● Consoling into VMs & Login Details

○ Having reviewed the meeting chat for context and the checks that need to be satisfied, it is

finally time to get into the VMs. Using the context and the network map, the player should be

able to identify what VMs need to be consoled into. If working on a technical challenge, the

player will likely need to make changes to these VMs within the workspace. When doing a

hybrid challenge, however, they often need only observe specified information within.

○ Machine/Service/Application Logins within the environment should always be the same unless

the challenge, under the additional information field or meeting chat, states otherwise. The

normal login credentials are the following…

■ Username/Login: playerone

■ Password: password123

Submitting a Challenge Using the Webportal

● Writing Documentation & Drafts

○ While completing the challenge, or at the end of the challenge, players need to document their

challenge solution. The player should format their documentation as professionally as possible

and document with as much detail as they feel is needed to clearly explain their solution.

○ Player documentation is automatically saved whenever the WebPortal detects changes to the

text area. This is so that if the player loses their internet connection or accidentally browses

away from the portal they will not lose their documentation while the challenge is still in

progress. A message will display below the text area whenever the WebPortal is in the process

of saving documentation.

● Adding Software/Utilities/Coding Languages to the Tools Used List

○ Along with documenting their solution to the challenge players will need to tag software

applications, operating system utilities, and coding languages utilized in their solution in the

tools used list. However, coding languages need only be added when the player uses a coding

language to write a script or program to aid in their completion of a challenge. 

● Final Submission & Ending the Challenge Attempt

○ Once the player is satisfied with their challenge attempt, has documented their solution, and has

added their tools used it is time to end the challenge attempt. This is done by clicking the

“Submit Challenge Attempt” button located on the top right of the page. Do NOT hit this button

until COMPLETELY DONE. A player CANNOT take the submission back or edit it once it is

submitted. This will end the challenge attempt and send the results to the curator.

Viewing Challenge Submissions

● Navigating to the Submissions Page

○ Upon successfully logging in to the Webportal, players may navigate to the Submissions page

by clicking on the “Submissions” link in the navbar. By default, challenge submissions will be

sorted by date of submission.

● Reviewing Challenge Attempts

○ Challenge submissions are listed in the table located in the upper half of the page. The table

can be sorted by clicking on the table header corresponding to the criteria by which you wish to

sort (assignment, timestamp, etc.). Challenge submissions that have been reviewed by the

curator will display a checkmark in the column labeled “Reviewed”

.

● Viewing Challenge Attempt Details

○ Clicking the green button labeled “View” on any row will populate the Submission Review view,

located below, with details corresponding to that particular challenge submission.

● Understanding the Challenge Attempt View

○ The challenge attempt view includes submission details such as:

■ Title

■ Complexity

■ Attempt Duration

13■ Check Status

■ T ools Used

■ Submitted Documentation

■ Submission Feedback

○ Each challenge consists of a series of checks that players must satisfy in order to complete it.

These checks, along with their descriptions, are listed in the section labeled “Final Check

Details”

.

○ An overall assessment of the player’s attempt to satisfy the challenge checks can be found

under the section labeled “Full Check Pass”

.

○ Players are asked to provide a list of any tools used during their challenge attempt. This list is

displayed in the section labeled “T ools Used”

.

○ Most challenges prompt the player to submit some sort of written documentation detailing how

they arrived at a solution. This documentation will be displayed in the section labeled “Submitted Documentation.

# Please make sure about NICE XpCyberRange is known for you to accept the order/

# “This is the step by step guide for the assignment to complete the task.” The task will be done on direct portal of NICe I tell remaining details on chat .Once the order is accepted# 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

In Units V, VI, and VII, you learned about the components of a computer, how a computer works, the internet, networks and network communications, cloud computing, web development, digital identity, so

In Units V, VI, and VII, you learned about the components of a computer, how a computer works, the internet, networks and network communications, cloud computing, web development, digital identity, social media, e-commerce, ethical behavior, databases, and explored two Microsoft Office applications, PowerPoint and Access.  In this assignment, you will

In the previous assignment, the annotated bibliography, you collected 15 – 20 references. Now, you are to craft an analytical research paper. Using the same themes assigned for the previous assignment

In the previous assignment, the annotated bibliography, you collected 15 – 20 references. Now, you are to craft an analytical research paper. Using the same themes assigned for the previous assignment.  GROUP 1: Context-Aware Computing  Prepare a ten (10) page research paper. In the paper, you are to cover the

This week, you will submit the second project, the Desktop Migration Proposal. Using the requirements analysis your manager provided and the Internet research you conducted, submit your recommendation

This week, you will submit the second project, the Desktop Migration Proposal. Using the requirements analysis your manager provided and the Internet research you conducted, submit your recommendation to the assignment folder. As you are writing your recommendation, ensure your analysis and recommendations align with your manager’s priorities and concerns.

In Units I, II, and III, you learned about the history of computers, application and system software, blockchain, cryptocurrency, computer ethics, and explored two Microsoft Office applications, Word

In Units I, II, and III, you learned about the history of computers, application and system software, blockchain, cryptocurrency, computer ethics, and explored two Microsoft Office applications, Word and Excel.  In this assignment you will demonstrate what you have learned in these three units. This assignment will have five parts. 

Research and brainstorm three (3) proposals for a mobile computing solution. Write up a half-page (double-spaced, approx. 250 words) description of each mobile computing solution proposal. Provide an

Research and brainstorm three (3) proposals for a mobile computing solution.  Write up a half-page (double-spaced, approx. 250 words) description of each mobile computing solution proposal. Provide answers to the following questions: 1) What is the 1 sentence summary of the mobile computing solution? 2) Who and how big is

Creating and Submitting your Portfolio Overview Creating a professional cybersecurity portfolio is essential for showcasing your skills, achievements, and growth. This portfolio will serve as a valuab

Creating and Submitting your Portfolio Overview Creating a professional cybersecurity portfolio is essential for showcasing your skills, achievements, and growth. This portfolio will serve as a valuable tool for presenting yourself to universities, scholarship committees, employers, and beyond. Objective:: To design a professional cybersecurity portfolio that markets your academic and

IntroductionFor this project, you will create a personal portfolio website to demonstrate your ability to use HTML, CSS, and JavaScript and resolve software problems in web development environments. Y

IntroductionFor this project, you will create a personal portfolio website to demonstrate your ability to use HTML, CSS, and JavaScript and resolve software problems in web development environments. You will create three HTML pages: a résumé, a cover letter, and a career goals page. As you make your website, you

IntroductionFor this project, you will create a personal portfolio website to demonstrate your ability to use HTML, CSS, and JavaScript and resolve software problems in web development environments. Y

IntroductionFor this project, you will create a personal portfolio website to demonstrate your ability to use HTML, CSS, and JavaScript and resolve software problems in web development environments. You will create three HTML pages: a résumé, a cover letter, and a career goals page. As you make your website, you

Need to report 1 You will submit two reports generated from your developed database. These reports should be meaningful to your database. The report(s) resolve one of the problems that you originally

Need to report 1 You will submit two reports generated from your developed database. These reports should be meaningful to your database. The report(s) resolve one of the problems that you originally identified in your Database Proposal.  The lay out should be appealing to the eye and the design should

Select any example visualization or infographic and imagine the contextual factors have changed: If the selected project was a static work, what ideas do you have for potentially making it usefully in

Select any example visualization or infographic and imagine the contextual factors have changed: If the selected project was a static work, what ideas do you have for potentially making it usefully interactive? How might you approach the design if it had to work on both mobile/tablet and desktop? If the

Excel 365/2021 Capstone – Level 2 Working with Sales Data These instructions are compatible with both Microsoft Windows and Mac operating systems. In this project, you will work with sales data from T

Excel 365/2021 Capstone – Level 2 Working with Sales Data These instructions are compatible with both Microsoft Windows and Mac operating systems. In this project, you will work with sales data from Top’t Corn, a popcorn company with an online store, multiple food trucks, and two retail stores. You will

Hello Students, As discussed in class, the Workspaces and Challenges are now active. Required Challenges for Full Credit To earn full credit (30% of the assignment), you must complete 6 challenges fro

Hello Students, As discussed in class, the Workspaces and Challenges are now active. Required Challenges for Full Credit To earn full credit (30% of the assignment), you must complete 8 challenges from the following list: Interns & HR on the Domain Controller Help Desk Fun: User Workstation Nightmares Dangerous Drives Preventative Protection: Thwarting the Imminent Threat Security