FACILITIES FOR HIRE

Cyber Security Operations Centre

Hire a fully equipped, instructor-supported Cyber Security Operations Centre (CSOC) for realistic red, blue and purple team simulations, ideal for small and medium businesses.

Holmesglen’s Cyber Security Operations Centre (CSOC) is a purpose-built IT space at our Chadstone campus in Melbourne, where organisations can safely run live cyber security exercises.

We run supported red, blue and purple team simulation activities, using the latest tools, and relevant scenarios, which allow your team to undertake:

  • Adversary emulation
  • Penetration testing
  • Incident investigation
  • Post-exercise reporting

Why hire our Cyber Security Operations Centre?

Our CSOC provides a dedicated environment for your small or medium business to upskill, develop and perform IT tasks relevant to your team. When you hire Holmesglen’s CSOC, you can:

  • Refine real-world attacks and defences without disrupting your production estate
  • Conduct table-top exercises to guide staff through their roles
  • Use enterprise-grade tooling and a technical support officer onsite for the duration of your hire

Email us at IT@holmesglen.edu.au to discuss hiring our CSOC.

Facility for hire – Overview

We offer various hiring options (see Room Hire and Training pdf, 468kb) to suit your team’s needs.
 
  • Half-day technical exercise (4 hours): Use of one lab + technical officer; basic injects & incident write-up
  • Full-day exercise (8 hours): Multi-team exercise, full logging and case management, end-of-day debrief and recommendations
  • Two-day purple engagement: Detection design, tuning and validation; follow-up rule set delivered
  • Bespoke package: Tailored scenario, advisory time, or vendor-style red team assessment

Note: An administration fee applies to bookings (as per our room hire terms).

Hirers must supply public liability insurance when completing the room hire booking (pdf, 468kb).

Note: Technical support officers are provided for IT/CSOC bookings.

We can configure the CSOC to meet your team’s exercise goals. Our room set-up options include:

  • An operations floor for analysts
  • Dedicated attacker lab for red‑team exercises
  • Secure war room for briefings
  • IoT simulation zone for device testing
  • Control/observation room for instructors and observers

An example of how specific rooms can operation, includes:

  • Security operations centre operations room: Analyst workstations, ELK/Wazuh dashboards, case management
  • Red team lab: Isolated attacker networks, offensive tooling and logging capture
  • Blue team lab: Defensive tooling, live monitoring consoles and hands-on remediation workstations
  • Purple team / Lessons learned room: Collaborative space for tuning detections and validating alerts
  • IoT smart-city simulation zone: Six scenario nodes (city cam, train takeover, city lights, track switch, extreme weather, dump protocol)
  • Control and observation room: Video/streaming links, instructor AV, secure brief/debrief area

We provide access to the following enterprise/open-source platforms during exercises:

  • Splunk
  • Wazuh
  • ELK (Elasticsearch / Logstash / Kibana)
  • Nessus
  • Shuffle (SOAR/workflow automation)
  • T-Rex (traffic replay/generation)
  • Cydarm (case management & documentation)
  • OpenCTI (threat intelligence platform)

These tools are pre-integrated into our exercise workflows, so your team can focus on detection and response during your time with us, instead of setup. 

We design and deliver scenario scripts or let your team run their own. Scenarios may include:

Network / Host

  • Reconnaissance and initial access (OSINT, web application fingerprinting, supply chain)
  • Phishing / Credential theft (BEC, social media phishing, credential harvesting)
  • Internal network access (Rogue access points, privilege escalation)

Purple / Detection

  • IoT takeover: Compromise a smart device (default creds) and attempt to alter configuration; test detection via IoT telemetry and anomaly detection
  • Spear-phish, ransomware: Target finance user, deploy ransomware behaviour in sandbox; test EDR detection and backup restore playbook
  • Supply-chain compromise: Push a malicious firmware update to a sensor network in test environment and see if blue team detects anomalous traffic
  • Table-top exercises

Blue / Response workflows
Blue team activities focus on the following three monitoring tasks:

  1. Monitoring sample historical logs to uncover attacker activity
  2. Monitoring real-time logs from servers
  3. Monitoring network traffic for anonymous login, sensitive file access and unusual log activity

We recommend your security analysts attend for blue team or purple sessions. We can supply experienced operators for red/purple sessions, if required. Prior to joining us, we ask hirers to confirm their roles. Example responsibilities:

Red team

  • Execute attack scenarios, generate malicious traffic and provide exact timestamps for the events they generate

Purple team

  • Design test cases, verify detection coverage, tune detection rules, validate alerts and coordinate communication between red and blue teams

Blue team

  • Receive and triage alerts; investigate in ELK and Wazuh, take containment/remediation actions, document findings and actions in Cydarm, and close the case and corresponding ELK alerts

Note: We can supply experienced red, blue or purple operators if you want a turnkey exercise (additional cost applies). 

No, all exercises are performed in isolated, purpose-built lab networks to ensure your production environment remains unaffected.

Holmesglen Cyber Security Operations Centre

Getting to our CSOC

Our Cyber Security Operations Centre is located at our Chadstone campus, which is opposite the Holmesglen train station (on the Glen Waverley line). If you are travelling by car, the CSOC is just two minutes from the Warrigal Rd exit on the Monash Freeway. 

Discover Holmesglen's list of training and industry spaces at our facilities for hire page.