In this chapter, we will put all of the components together and discuss the architecture that can support the scenarios we have covered throughout the book. In this chapter, we will be discussing the following topics:
Creating the layered architecture
Integrating decoys and honeypots
Attacking the cyber range
Recording the attack data for further training and analysis
This chapter will provide us with a complete architecture that we can use to preform our testing. This design will allow us to plug in any required components that we might have. Furthermore, it will provide you with the capability to test all types of testing that you might need.