FULL SPECTRUM SPACE CYBERSECURITY PROFESSIONAL
(SCOR Practitioner) — Session 2: Live Operations
Zendir.io Digital Twin Platform — From Theory to Operations
4 Hours | 5 Knowledge Domains | 40 Minutes Each
Delivered by ProofLabs | In partnership with ethicallyHackingspace (eHs)®
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN2
OPERATIONS BRIEFING
Your Five Live Missions — From Situational Awareness to Cyber Defense
You trained as space cybersecurity operators in Session 1. Now you operate for real. The Zendir.io digital twin puts you in the operator's seat. Each mission escalates from monitoring to active defense.
6
OVERWATCHSpace Situational Awareness — Open Your Eyes (40 min)
7
HELIOSSatellite Operations — Hands on the Wheel (40 min)
8
APERTUREPayload Operations — Capture the Mission (40 min)
9
SAFEGUARDSatellite Ops IR — When Things Go Wrong (40 min)
10
THUNDERDOMESatellite Cyber IR — Fight for the Platform (40 min)
MISSION QUESTION
You've built the threat model, the detection rules, and the telemetry plan. Now you're at the operator terminal. What is the very first thing you check?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN3
SESSION 1 FOUNDATIONS RECAP
🗺
Platform decomposed using METEORSTORM five-layer model. All assets, segments, and services catalogued.
📡
Threat landscape mapped across six enrichment sources: SPARTA, ATT&CK, EMB3D, D3FEND, MISP, STIX.
🛡
Priority Intelligence Requirements established at Strategic, Operational, and Tactical tiers.
⚡
Converged detection rules engineered across cyber, physical, and operational domains.
🔦
Telemetry instrumentation plan validated with gap analysis and remediation priorities.
These five outputs are your operational foundation. Session 2 puts them into action.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN4
ZENDIR.IO DIGITAL TWIN PLATFORM
Your Satellite Operations Environment
Zendir.io provides a full-fidelity digital twin of a LEO satellite constellation including spacecraft bus, payload, ground station, and communications links. All operations execute in real time.
PLATFORM CAPABILITIES
- Operator Terminal — Individual workstation displays for spacecraft health, orbital position, and communications
- Spacecraft Bus Subsystems — Power, thermal, ADCS, onboard data handling, communications
- Payload Systems — Electro-optical camera with configurable aperture, FOV, spectral bands, GSD
- Simulation Injects — Instructor-controlled scenario events including telemetry anomalies and adversary attacks
TEAM ROLES
🎖 Mission Commander
🛰 Spacecraft Operator
📷 Payload Operator
🔐 Cybersecurity Analyst
ZENDIR.IO OPERATOR CONSOLE
SPACECRAFT HEALTH
Power: 28.2V ✓
Thermal: 21°C ✓
ADCS: Nominal ✓
ORBITAL MAP
Alt: 552km
Inc: 53.0°
Next GS: 12:34 UTC
TELEMETRY TIMELINE
Last update: 00:08s
Anomalies: 0
Alerts: None
COMMAND INTERFACE
Queue: 3 pending
Last CMD: 11:58 UTC
Auth: Verified ✓
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN5
SESSION 2 LEARNING OUTCOMES
👁
Monitor spacecraft health and environmental conditions to establish operational baselines
☀
Execute spacecraft bus operations including pointing, power management, and communications
📷
Configure and operate Earth observation payloads with mission-driven tasking
🛡
Detect, classify, and respond to operational anomalies with structured incident procedures
⚔
Defend satellite architecture against cyber attacks in Red vs. Blue team exercise
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN6
MISSION 6: OVERWATCH
Space Situational Awareness — Open Your Eyes
Before you can operate, you must see. Before you can defend, you must understand what normal looks like. Your first live mission: establish the operational picture and build the baselines every subsequent mission depends upon.
⏱ 40 MINUTES
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN7
MISSION 6 OBJECTIVES
- Navigate the Zendir.io interface, identifying key displays for spacecraft health, orbital position, and communications status.
- Monitor satellite telemetry in real time, correlating housekeeping data with baselines from Session 1 decomposition.
- Interpret space weather advisories and assess impact on spacecraft subsystems, links, and payload.
- Track orbital elements and identify deviations indicating perturbation, conjunction risk, or anomalous maneuvering.
- Apply METEORSTORM taxonomy tagging to observed telemetry anomalies for structured reporting.
- Establish an operational baseline that serves as the reference state for incident detection in Domains 9 and 10.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN8
FROM THEORY TO OPERATIONS
SESSION 1 → SESSION 2 BRIDGE
- Your decomposition becomes your monitoring checklist
- Your detection rules become alert triggers
- Your telemetry plan becomes your data feeds
- Your PIR become your operational priorities
- Your enrichment frameworks become your threat context
Key Insight: Every artifact from Session 1 has a direct operational counterpart in Zendir.io. Theory becomes practice the moment you log in.
ZENDIR.IO MAPPING
BLUEPRINT→ Asset inventory panel
PANORAMA→ Threat context overlay
SENTINEL→ Alert priority queue
TRIPWIRE→ Detection rule engine
LIGHTHOUSE→ Telemetry data feeds
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN9
MONITORING THE OPERATIONAL ENVIRONMENT
SPACECRAFT HEALTH
AST:HW, AST:SW
- Power voltage/current
- Thermal readings by zone
- ADCS attitude and rates
- OBC status and memory
- Link quality metrics
ORBITAL ENVIRONMENT
PCE:Orbital, SEG:Space
- TLE tracking and updates
- Conjunction assessment
- Orbital decay monitoring
- Debris tracking alerts
- Maneuver detection
SPACE WEATHER
PCE:Orbital hazards
- Solar flux index (F10.7)
- Geomagnetic Kp index
- Radiation belt counts
- Ionospheric scintillation
- SEU event tracking
Baseline Principle: "Document 'normal' for every parameter. Anomaly detection is only as good as your baseline."
MISSION QUESTION
Spacecraft telemetry shows a 3% solar array current drop that recovers over two orbits. Anomaly or normal? What additional data do you need?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN10
TELEMETRY CORRELATION & BASELINE ESTABLISHMENT
CORRELATION PATTERNS FOR ANOMALY DISCRIMINATION
Power dip + thermal change + orbital position matches eclipse entry → Nominal event, log and continue
Power dip + NO thermal change + NO orbital event → Potential subsystem degradation, investigate
Power dip + attitude change + unexpected RF event → Escalate to Cybersecurity Analyst, apply AN:IOA
BASELINE TEMPLATE
| Parameter | Expected Range | Deviation Threshold | METEORSTORM Tag |
| Bus Voltage | 27.5–28.5V | >±0.5V | AST:HW:PowerSubsystem |
| Payload Bay Temp | 15–25°C | >±3°C | AST:HW:ThermalControl |
| ADCS Pointing Error | <0.1° | >0.2° | AST:HW:ADCS |
| S-band Uplink Margin | >6dB | <3dB | SVC:Control / SEG:Link |
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN11
SPACE WEATHER & ENVIRONMENTAL AWARENESS
SPACE WEATHER → METEORSTORM MAPPING
Solar Flares
PCE:Orbital hazard → AST:HW impact on solar arrays, sensors
Geomagnetic Storms
SEG:Link degradation → SVC:Data communications disruption
Radiation Belt Enhancement
AST:HW single-event upsets → AN:IOC false positive generator
Critical Insight: Space weather events can mimic adversary actions. Environmental context is essential for every anomaly assessment.
SPACE WEATHER SCALE
G5Extreme
Widespread disruption, safe mode recommended
G3Strong
Baseline adjustments required, monitor closely
G1Minor
Note in log, no operational change needed
MISSION QUESTION
A geomagnetic storm is forecast for 6 hours. Which baselines should you temporarily adjust, and how do you document this in a METEORSTORM-compliant report?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN12
STARCOM-LEO: ESTABLISHING THE OPERATIONAL BASELINE
Worked example baselines for STARCOM-LEO — each parameter tagged to the METEORSTORM taxonomy hierarchy:
| Subsystem | Parameter | Nominal Range | METEORSTORM Tag |
| Power | Bus voltage | 27.5–28.5V | PCE:Orbital > SEG:Space > SVC:Control > AST:HW:PowerSubsystem |
| Power | Solar array current (sunlit) | 4.0–4.4A | AST:HW:SolarArray |
| Power | Battery DOD | <30% | AST:HW:Battery |
| Thermal | Payload bay temperature | 15–25°C | AST:HW:ThermalControl |
| Thermal | Battery temperature | 5–20°C | AST:HW:Battery |
| ADCS | Pointing accuracy | <0.1° | AST:HW:ADCS / AST:SW:FlightSoftware |
| Comms | S-band uplink margin | >6dB | SEG:Link > SVC:Control > AST:HW:Antenna |
| Comms | X-band downlink margin | >3dB | SEG:Link > SVC:Data > AST:HW:Antenna |
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN13
MISSION 6 EXERCISE: GUIDED MONITORING
⏱ 10 MINUTES — INSTRUCTOR-FACILITATED LIVE EXERCISE
- Identify each telemetry variation from your established baseline
- Classify each variation as nominal or anomalous
- Tag each anomaly with the appropriate METEORSTORM taxonomy elements (PCE, SEG, SVC, AST, AN)
- Document findings in a structured SSA status report
Deliverable: Completed SSA status report with METEORSTORM-tagged anomalies. This baseline becomes your reference for all subsequent missions.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN14
MISSION 6 CHECKPOINT
CHECKPOINT Q1
What three categories of information compose the SSA picture in Zendir.io? How does each map to the METEORSTORM taxonomy?
CHECKPOINT Q2
How does a space weather advisory map to METEORSTORM taxonomy elements? Walk through a G3 geomagnetic storm scenario.
CAPSTONE ACTIVITY (5 MIN)
Produce a complete SSA status report covering: spacecraft health status, orbital position summary, environmental conditions, and any anomalies with full METEORSTORM taxonomy tags.
MISSION QUESTION
You monitor two spacecraft in the same orbital plane—one shows a power anomaly, one does not. What does this asymmetry tell you about the likely cause? How does your answer change if both show the anomaly simultaneously?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN15
MISSION 6 ASSESSMENT RUBRIC
| Criterion | Exemplary (4) | Proficient (3) | Developing (2) | Beginning (1) |
|---|
Platform Navigation & Telemetry Interpretation Navigates Zendir.io, interprets telemetry, identifies baselines | Navigates all displays confidently, correlates multiple telemetry streams, identifies all baselines with correct METEORSTORM references | Navigates primary displays, interprets key indicators with appropriate taxonomy | Navigates basic displays but struggles with correlation or taxonomy | Cannot navigate displays or interpret basic telemetry |
Environmental Awareness Integrates space weather, orbital dynamics, EM spectrum | Integrates space weather, orbital dynamics, and EM spectrum into unified assessment with proactive impact predictions | Interprets space weather and orbital data correctly, identifies potential impact | Acknowledges environmental factors but cannot assess operational impact | Cannot interpret space weather data |
Anomaly Detection & Reporting Detects anomalies, classifies with METEORSTORM, produces SSA report | Detects all anomalies, classifies with correct METEORSTORM taxonomy, produces comprehensive SSA report | Detects most anomalies with classification and adequate report | Detects some anomalies with incomplete taxonomy or unstructured report | Cannot distinguish anomalous from normal telemetry |
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN16
MISSION 6 SCORE CARD
👁
DOMAIN 6: OVERWATCH
Pass: ≥ 6/12 (50%) | No domain below pass threshold for credential
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN17
✓
MISSION 6: OVERWATCH — COMPLETE
You can see the battlespace. Now take the controls. Next: HELIOS — hands on the wheel.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN18
MISSION 7: HELIOS
Satellite Operations — Hands on the Wheel
Situational awareness gave you the picture. Now you take control—executing pointing maneuvers, managing subsystems, and commanding the satellite. Every action creates data your detection rules must process.
⏱ 40 MINUTES
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN19
MISSION 7 OBJECTIVES
- Execute pointing maneuvers: Inertial, Sun, Velocity, Nadir, Ground Station, and Location modes.
- Monitor and manage bus subsystems: power, thermal, onboard data handling.
- Verify health using pre-op checklist aligned to METEORSTORM AST:HW, AST:SW, AST:DA.
- Execute command sequences for station keeping and attitude adjustment.
- Manage communications: uplink scheduling, downlink reception, link budget monitoring.
- Document activities in mission log with METEORSTORM taxonomy references.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN20
OPERATOR TERMINAL QUALIFICATION
PRE-OPERATION CHECKLIST
- 1. Verify telemetry feed live — timestamp <30s, all streams active
- 2. Confirm all subsystems nominal — compare to Domain 6 baselines
- 3. Check communications window schedule — next AOS/LOS times
- 4. Review command queue — pending commands, authorization status
- 5. Confirm team roles — all positions staffed, comms protocol active
METEORSTORM: Each checklist item maps to AST:HW, AST:SW, and SVC elements — your decomposition from Session 1 is your checklist.
TEAM COMMUNICATION PROTOCOL
CMDCommander
Authorizes all commands, declares incidents
OPSSpacecraft Operator
Executes bus commands, monitors health
PAYPayload Operator
Manages imaging tasks, data products
CSACybersecurity Analyst
Monitors for cyber indicators, advises escalation
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN21
SPACECRAFT POINTING MODES
Fixed to celestial frame. Use: star tracker calibration, deep space observation. ADCS: quaternion hold.
Solar array aligned to sun vector. Use: maximum power generation during low-power states. ADCS: sun sensor primary.
Aligned with velocity vector. Use: drag management, aerodynamic stability. ADCS: GPS/TLE derived.
Earth-facing. Use: primary Earth observation mode. ADCS: Earth sensor, settling time ~3 min.
Antenna aimed at ground station. Use: communications passes. ADCS: ground track prediction.
Payload aimed at geographic coordinates. Use: targeted imaging. ADCS: highest accuracy mode, <0.05°.
MISSION QUESTION
Satellite is Sun Pointing for battery charging. Urgent imaging task arrives. What trade-offs must you consider before switching to Location Pointing?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN22
BUS SUBSYSTEM MANAGEMENT
POWER
AST:HW:PowerSubsystem
- Solar array monitoring (current, voltage, temperature)
- Battery state-of-charge management
- Load shedding priority list
- Eclipse entry/exit preparation
- Power budget enforcement
THERMAL
AST:HW:ThermalControl
- Zone-by-zone temperature monitoring
- Heater control (survival vs. operational)
- Hot case / cold case management
- Payload thermal conditioning
- Attitude-thermal interdependency
DATA HANDLING
AST:HW:OBC, AST:SW:FSW
- OBC health and watchdog status
- Memory utilization and management
- Data bus integrity checks
- Flight software version verification
- Autonomous fault detection status
Interdependencies: Payload heater activation → power draw increase. Attitude change → thermal profile shift. Understanding these chains is essential for Domain 9 incident discrimination.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN23
COMMUNICATIONS LINK OPERATIONS
GROUND STATION PASS MANAGEMENT
- AOS (Acquisition of Signal) — Confirm link established, verify margin
- Command Window — Uplink validated commands in priority order
- Telemetry Reception — Download buffered health and security data
- LOS (Loss of Signal) — Confirm all commands acknowledged, log pass
SECURITY IMPERATIVE
The uplink command channel is the most critical attack surface. Every command must be validated before transmission. Authentication, integrity, and authorization checks are non-negotiable.
LINK BUDGET ELEMENTS
TXTransmit Power
Ground station EIRP (dBW)
GAAntenna Gain
Spacecraft receive gain (dBi)
PLPath Loss
Free-space loss at range (dB)
MGLink Margin
Required >6dB for reliable uplink
MISSION QUESTION
8-minute pass. 15 commands to uplink, 200MB to downlink. How do you prioritize—and what security checks before each command?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN24
STARCOM-LEO: OPERATIONAL SEQUENCE
Worked example — complete operational sequence for a STARCOM-LEO imaging pass:
Step 1: Pre-ops Checklist Verification — All 5 items confirmed, team roles assigned
↓
Step 2: Attitude Transition — Sun Pointing → Nadir for imaging (3 min settling)
↓
Step 3: Subsystem Monitoring — Power budget confirmed, thermal stable, ADCS locked
↓
Step 4: Ground Station Pass — AOS 14:22 UTC, 8 commands uplinked, 180MB downlinked, LOS 14:30
↓
Step 5: Post-pass Documentation — Mission log updated, METEORSTORM tags applied, anomalies: none
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN25
MISSION 7 EXERCISE: GUIDED OPERATIONS
⏱ 10 MINUTES — TEAM OPERATIONS EXERCISE
- Execute attitude transition commanded by Mission Commander (Sun → Nadir or Location)
- Monitor subsystem impacts during and after transition
- Manage ground station pass: command uplink + telemetry downlink
- Respond to simulated power constraint injected by instructor
- Document all activities with METEORSTORM taxonomy tags
Deliverable: Mission operations log with all commands, subsystem states, anomaly responses, and METEORSTORM taxonomy references.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN26
MISSION 7 CHECKPOINT
CHECKPOINT Q1
Which pointing mode maximizes solar power generation, and why? What ADCS sensors are primary in this mode?
CHECKPOINT Q2
What METEORSTORM Asset elements are involved in an ADCS pointing maneuver? Trace from AST:HW through AST:SW to SVC:Control.
CAPSTONE ACTIVITY (5 MIN)
Complete a mission operations log covering all commands executed, subsystem states at each step, and full METEORSTORM taxonomy references for every action.
MISSION QUESTION
An operator sends a pointing command conflicting with the power budget. Spacecraft enters safe mode. Who is responsible? How should the incident be documented using METEORSTORM taxonomy?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN27
MISSION 7 ASSESSMENT RUBRIC
| Criterion | Exemplary (4) | Proficient (3) | Developing (2) | Beginning (1) |
|---|
Spacecraft Pointing Execution Executes transitions, monitors ADCS, demonstrates trade-off understanding | Executes all transitions smoothly, monitors ADCS telemetry, demonstrates trade-off understanding | Executes transitions correctly with telemetry monitoring and mode rationale | Executes basic transitions, struggles with telemetry or justification | Cannot execute pointing maneuvers or interpret ADCS telemetry |
Subsystem Verification & Monitoring Completes checks with correct METEORSTORM mappings | Comprehensive checks, all METEORSTORM mappings correct, proactive interdependency identification | Completes checks with correct taxonomy, adequate monitoring | Partial checks, some taxonomy errors, monitoring gaps | Cannot perform structured verification or map to METEORSTORM |
Operational Documentation Mission log accuracy, taxonomy, and traceability | Complete mission log, accurate taxonomy, operational rationale, full traceability | Adequate log with correct taxonomy and key events | Incomplete log with missing taxonomy or gaps | Cannot produce a mission log |
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN28
MISSION 7 SCORE CARD
☀
DOMAIN 7: HELIOS
Pass: ≥ 6/12 (50%) | No domain below pass threshold for credential
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN29
✓
MISSION 7: HELIOS — COMPLETE
You've mastered the bus. Now execute the mission's purpose. Next: APERTURE — capture the mission.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN30
MISSION 8: APERTURE
Payload Operations — Capture the Mission
The bus is your vehicle. The payload is your purpose. Configure cameras, plan imaging tasks, manage data, and coordinate payload with bus operations to deliver mission results.
⏱ 40 MINUTES
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN31
MISSION 8 OBJECTIVES
- Configure payload parameters: aperture, FOV, spectral bands, GSD.
- Plan and execute imaging tasks: orbital geometry, lighting, pointing, target coordinates.
- Assess image quality: spatial resolution, spectral fidelity, geometric accuracy.
- Manage onboard storage and prioritize downlink scheduling.
- Coordinate payload with bus operations for pointing, power, and thermal.
- Document payload operations with METEORSTORM Data Plane and Asset layer references.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN32
CAMERA AND SENSOR FUNDAMENTALS
ZENDIR.IO EO CAMERA PARAMETERS
f/Aperture
Light gathering and diffraction-limited resolution. Larger aperture = sharper image at cost of FOV.
FOVField of View
Angular extent vs. resolution trade-off. Wide FOV = lower resolution, larger coverage area.
GSDGround Sample Distance
Spatial resolution at surface. GSD = (altitude × pixel size) / focal length.
λSpectral Bands
Visible, NIR, thermal — each reveals different surface features.
METEORSTORM: Payload = AST:HW:Payload. Parameters = AST:DA. Products = SVC:Data output.
GSD GEOMETRY
ALTITUDE vs. GSD
| Alt (km) | GSD @ f=1m | Coverage |
| 400 | 0.5m | Narrow |
| 550 | 0.7m | Medium |
| 800 | 1.0m | Wide |
MISSION QUESTION
Payload can image at 1m GSD but mission requires 5m. Why choose lower resolution—and what operational advantages does this provide?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN33
MISSION-DRIVEN IMAGING TASKS
TASK PLANNING PROCESS
1. Receive tasking order (target coordinates, parameters)
↓
2. Calculate orbital geometry — overflight timing and lighting
↓
3. Coordinate with bus — pointing mode, power, thermal
↓
4. Configure payload parameters (aperture, FOV, band, GSD)
↓
5. Execute during overflight window
↓
6. Verify capture and assess quality
METEORSTORM TRACEABILITY
Imaging creates AST:DA delivered through SVC:Data, requiring SVC:Control for pointing.
IMAGING WINDOW FACTORS
- Sun angle >20° for adequate illumination
- Cloud cover assessment (if optical)
- Satellite ground track alignment
- Power budget sufficient for payload
- Thermal pre-conditioning complete
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN34
IMAGE QUALITY ASSESSMENT
QUALITY CRITERIA
- Spatial Resolution — Achieved GSD vs. required GSD
- Spectral Fidelity — Band calibration accuracy, radiometric quality
- Geometric Accuracy — Geolocation error vs. mission requirement
DEGRADATION CAUSES
- Pointing errors during capture window
- Vibration from reaction wheel operation
- Thermal effects on focal plane
- Exposure timing errors
- Atmospheric effects (for optical)
CYBERSECURITY CONNECTION
⚠ CRITICAL: Subtle payload manipulation — altered calibration, timing offsets, parameter injection — can corrupt imagery while appearing valid. This is a potential AN:IOA indicator that only the Cybersecurity Analyst is trained to recognize.
Unexpected geometric artifacts not matching known sensor behavior → escalate to CSA immediately.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN35
ONBOARD DATA MANAGEMENT
STORAGE MANAGEMENT PROCESS
- Assess utilization — Current storage use and remaining capacity
- Prioritize by mission priority — High-priority imagery protected first
- Schedule downlink windows — Maximum throughput during passes
- Delete/compress — Lower-priority data as needed for capacity
DATA INTEGRITY
Checksums and verification for both storage and transmission. Corrupted data may indicate hardware failure or adversary interference — always verify before deletion.
METEORSTORM DATA PLANE
ASTAST:HW:DataStorage
Physical storage hardware
ASTAST:DA
Data products (imagery)
SVCSVC:Data via SEG:Link
Downlink data service
MISSION QUESTION
Storage 80% full. High-priority task needs the remaining 20%. Un-downlinked lower-priority imagery exists. Delete, compress, or skip the new task? What information do you need before deciding?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN36
STARCOM-LEO: PAYLOAD OPERATIONS SEQUENCE
Worked example — complete payload cycle for a STARCOM-LEO tasked imaging mission:
| Phase | Action | Parameters | METEORSTORM Tag |
| Tasking | Image target at [35.68°N, 139.69°E] | Visible band, <3m GSD | AST:DA (tasking order) |
| Planning | Overpass in 45 min, sun angle 35° | Location Pointing 5 min before | SVC:Control / AST:HW:ADCS |
| Coordination | Power and thermal confirmed by bus operator | 28.1V, payload bay 22°C | AST:HW:Power / AST:HW:Thermal |
| Execution | Camera configured, image captured | 12-second window, f/4, 550nm | AST:HW:Payload / AST:DA |
| Assessment | Quality verified | GSD 2.8m, geoloc 10m, spectral nominal | AN:IOC (quality check) |
| Data | 850MB stored, queued for next pass | Storage: 67% utilized | AST:HW:DataStorage / SVC:Data |
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN37
MISSION 8 EXERCISE: DATA MANAGEMENT
⏱ 10 MINUTES
- Assess current storage utilization in Zendir.io
- Execute 2+ imaging tasks at different priority levels
- Prioritize downlink scheduling for the next ground station pass
- Manage storage constraints — make and justify a delete/compress/defer decision
- Document all payload operations with METEORSTORM taxonomy
Deliverable: Payload operations summary covering tasks executed, quality assessments, data management decisions, and METEORSTORM taxonomy documentation.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN38
MISSION 8 CHECKPOINT
CHECKPOINT Q1
What is the relationship between camera FOV and GSD? If you increase focal length while keeping altitude constant, what happens to both?
CHECKPOINT Q2
Name the METEORSTORM layers and elements involved in an EO imaging task from planning through downlink. How many distinct taxonomy tags are required?
CAPSTONE ACTIVITY (5 MIN)
Produce a payload operations summary covering all tasks executed, quality assessments, data management decisions, and METEORSTORM taxonomy documentation.
MISSION QUESTION
Captured image shows unexpected geometric artifacts not matching known sensor behavior. Hardware failure, software bug, or adversary tampering? How do you investigate without alerting a potential adversary?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN39
MISSION 8 ASSESSMENT RUBRIC
| Criterion | Exemplary (4) | Proficient (3) | Developing (2) | Beginning (1) |
|---|
Payload Configuration & Execution Parameters correct, timing/coordination, sensor trade-offs | All parameters correct for different missions, optimal timing/coordination, sensor trade-off understanding | Correct parameters with appropriate coordination and timing | Basic config, needs guidance on optimization, bus coordination struggles | Cannot configure payload or execute imaging tasks |
Image Quality Assessment Evaluates against requirements, root cause analysis, security implications | Evaluates against all requirements, root cause analysis, connects anomalies to cybersecurity indicators | Evaluates against primary requirements, identifies major issues | Basic assessment, cannot diagnose degradation or security implications | Cannot assess quality or distinguish acceptable from unacceptable |
Data Management & Documentation Storage/downlink management, prioritization, METEORSTORM documentation | Optimal storage/downlink management, mission-impact prioritization, comprehensive METEORSTORM documentation | Adequate management, correct prioritization, acceptable documentation | Reactive management, incomplete prioritization, documentation gaps | Cannot manage storage or document operations |
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN40
MISSION 8 SCORE CARD
📷
DOMAIN 8: APERTURE
Pass: ≥ 6/12 (50%) | No domain below pass threshold for credential
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN41
✓
MISSION 8: APERTURE — COMPLETE
You can see, operate, and capture. Now things go wrong. Next: SAFEGUARD — when things go wrong.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN42
MISSION 9: SAFEGUARD
Satellite Ops Incident Response — When Things Go Wrong
Systems degrade, sensors fail, the environment is hostile. Detect anomalies, classify incidents, execute response procedures — while determining operational failure vs. adversary action. Your Domain 6 baselines are now your most important tool.
⏱ 40 MINUTES
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN43
MISSION 9 OBJECTIVES
- Detect anomalies through telemetry deviation analysis against Domain 6 baselines.
- Classify by subsystem, severity, and METEORSTORM exposure domain (Kinetic, Non-Kinetic Physical, EW, Cyber, Environmental).
- Execute structured IR for power degradation, attitude anomalies, thermal exceedance, link failures.
- Coordinate multi-role response: Commander, Operator, Payload, Cybersecurity Analyst.
- Distinguish operational vs. cyber-origin anomalies using AN:IOA, AN:IOC.
- Produce structured incident report with METEORSTORM taxonomy.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN44
ANOMALY DETECTION AND CLASSIFICATION
SEVERITY LEVELS
L1Advisory
Trending toward threshold, no impact yet. Log and monitor.
L2Caution
Threshold exceeded, monitor closely, prepare contingency plan.
L3Warning
Subsystem degraded, operational impact, execute contingency.
L4Emergency
Mission-threatening, immediate response required, consider safing.
Detection framework: thresholds from Domain 6 baselines, trending vs. instantaneous deviation, multi-parameter correlation. METEORSTORM: Each anomaly classified by exposure domain.
MISSION QUESTION
Sudden 15% solar array current drop, not in eclipse. Level 2 or Level 3? What three data points do you check first?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN45
INCIDENT RESPONSE SCENARIOS
Solar array current drop. Response: Verify orbital position, check conjunction, assess battery SOC, prepare load shedding priority list. METEORSTORM: AST:HW:SolarArray → AN:IOC.
Deviation without command. Response: Check ADCS sensors, wheel speeds, external torques, verify no unauthorized command. METEORSTORM: AST:HW:ADCS → AN:IOA (if no cause found).
Payload bay over limits. Response: Assess heater status, attitude relative to sun, solar exposure, implement thermal contingency. METEORSTORM: AST:HW:ThermalControl → AN:IOC.
Downlink margin dropping. Response: Check antenna health, RF environment, ground equipment status, evaluate jamming indicators. METEORSTORM: SEG:Link → AN:IOA (if EW suspected).
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN46
CYBER OR OPERATIONAL? THE CRITICAL QUESTION
DISCRIMINATION FRAMEWORK
- Timing — Does anomaly coincide with predictable events (eclipse, pass, solar activity)?
- Multi-subsystem — Multiple unrelated subsystems simultaneously? (suggests cyber)
- Behavioral — Matches known SPARTA/ATT&CK techniques from Session 1?
- Command correlation — Did it follow an uplinked command? Was it authorized?
- Environmental context — Can space weather or hardware limitations explain it?
Session 1 Connection: Threat models (PANORAMA) and detection rules (TRIPWIRE) provide reference patterns for this discrimination.
ESCALATION PATHWAY
Anomaly Detected
↓
Environmental check → Explains it? → Log as nominal
↓ No
Hardware/software check → Explains it? → Ops IR
↓ No
Behavioral check → Matches SPARTA/ATT&CK? → AN:IOA
↓ Yes
Escalate to Domain 10: THUNDERDOME
MISSION QUESTION
Two spacecraft, same orbital plane, simultaneous comms degradation. Ground station nominal. Space weather quiet. Coincidence, shared cause, or coordinated EW attack?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN47
COORDINATED TEAM INCIDENT RESPONSE
Declare incident level, assign priorities, external coordination, go/no-go decisions. Communication: "Commander declares Level [X] incident. [Role], execute [contingency]."
Execute contingencies, manage bus response, prepare safing if directed. Continuous telemetry monitoring and status reporting to Commander every 60 seconds.
Secure payload (safe mode if directed), assess mission impact, preserve data products. Verify payload is not the source of anomaly.
Evaluate cyber indicators against Session 1 detection rules, correlate with PANORAMA threat models, advise Commander on escalation to Domain 10.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN48
MISSION 9 EXERCISE: COORDINATED RESPONSE
⏱ 10 MINUTES — MULTI-SUBSYSTEM CASCADING INCIDENT
- Detect and classify the initial anomaly using Domain 6 baselines
- Assess cascading secondary impacts across subsystems
- Execute multi-role coordinated response using team communication protocol
- Apply cyber vs. operational discrimination framework
- Produce structured METEORSTORM-tagged incident documentation
Deliverable: Structured incident report with timeline, METEORSTORM elements, response actions, discrimination assessment, and lessons learned.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN49
MISSION 9 CHECKPOINT
CHECKPOINT Q1
Level 3 vs. Level 4 incident — how does the classification affect response priorities, team coordination, and the go/no-go decision for safing?
CHECKPOINT Q2
Name two specific indicators that would suggest cyber origin rather than mechanical or environmental cause. What METEORSTORM Analytic layer tags apply?
CAPSTONE ACTIVITY (5 MIN)
Produce a structured incident report: timeline, METEORSTORM taxonomy elements, response actions taken, discrimination assessment (operational vs. cyber), and lessons learned.
MISSION QUESTION
Post-incident: the Cybersecurity Analyst flagged a potential cyber indicator 90 seconds before the cascading failure — but the team was focused on the power anomaly. How do you restructure procedures to prevent this?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN50
MISSION 9 ASSESSMENT RUBRIC
| Criterion | Exemplary (4) | Proficient (3) | Developing (2) | Beginning (1) |
|---|
Anomaly Detection & Classification Detection speed, classification accuracy, taxonomy completeness | Rapid proactive detection, correct subsystem/severity/exposure domain classification, complete taxonomy | Reasonable timeliness, correct classification with appropriate taxonomy | Detects obvious anomalies, delayed, incomplete classification | Cannot detect or classify anomalies |
Incident Response Execution Correct procedures, team coordination, mission continuity | Correct procedures for all scenarios, effective team coordination, mission continuity maintained | Correct procedures, adequate coordination, acceptable posture | Partial procedures, significant coordination gaps | Cannot execute structured IR |
Cyber-Operational Discrimination Identifies distinguishing indicators, applies AN:IOA/AN:IOC, escalation recommendations | Correctly identifies distinguishing indicators, applies AN:IOA/AN:IOC, actionable escalation recommendations | Distinguishes most indicators, understands escalation pathway | Acknowledges cyber possibility but cannot reliably identify indicators | Cannot distinguish operational from cyber anomalies |
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN51
MISSION 9 SCORE CARD
🛡
DOMAIN 9: SAFEGUARD
Pass: ≥ 6/12 (50%) | No domain below pass threshold for credential
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN52
✓
MISSION 9: SAFEGUARD — COMPLETE
You've handled operational incidents and distinguished failure from attack. Now the adversary stops hiding. Final mission: THUNDERDOME — Red vs. Blue. Fight for the platform.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN53
MISSION 10: THUNDERDOME
Satellite Cyber Incident Response — Fight for the Platform
The culminating exercise. Everything across ten knowledge domains converges here. Red Team has breached the perimeter. Blue Team must detect, contain, eradicate, and recover — while keeping the mission alive. Every METEORSTORM concept leads to this moment.
⏱ 40 MINUTES
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN54
MISSION 10 OBJECTIVES
- Detect cyber attack indicators across full architecture using AN:IOA, AN:IOC, AN:DET in Zendir.io.
- Analyze ground station compromise: assets, vectors, lateral movement via METEORSTORM attack path mapping.
- Detect and respond to onboard compromise: unauthorized commands, telemetry manipulation, payload interference.
- Execute detection-containment-eradication-recovery adapted for satellite constraints (bandwidth, delay, connectivity).
- Coordinate Blue Team across all roles, integrating cyber response with spacecraft safing and mission continuity.
- Produce METEORSTORM-tagged cyber IR report for collective defense sharing via MISP.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN55
CYBER THREAT LANDSCAPE: SATELLITE OPERATIONS
SESSION 1 THREAT MODEL → LIVE CONTEXT
ATTACK SURFACE
- Ground station network — IT/OT convergence, remote access, insider threat
- Command uplink — Authentication, replay attacks, spoofing
- Telemetry downlink — Data integrity, interception, manipulation
- Flight software — Unauthorized updates, memory corruption, logic bombs
- Payload data pipeline — Data exfiltration, product manipulation
Key: "Your Session 1 threat model predicted these vectors. Your detection rules are active. Theory becomes reality."
THREAT ACTORS
NSNation-State
Sophisticated, persistent, strategic objectives
CRCriminal
Financial motivation, ransomware, data theft
HAHacktivist
Disruption, publicity, ideological motivation
INInsider
Privileged access, hardest to detect
MISSION QUESTION
Your Session 1 threat model predicted command uplink attacks. But Red Team doesn't always attack where expected. What blind spots might your model have missed?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN56
GROUND STATION COMPROMISE
THREE-PHASE ATTACK PROGRESSION
Unusual auth patterns, failed logins, unexpected processes. Detection window: 5–15 min.
Internal traffic anomalies, credential reuse, access to command systems. Detection window: 15–45 min.
Command queue modifications, telemetry forwarding, data staging. Detection window: Before first unauthorized command.
BLUE TEAM RESPONSE
- Detect at each phase using Session 1 detection rules
- Classify with METEORSTORM attack path: SEG:Ground > SVC:Control > AST:SW > AN:IOC
- Contain: isolate compromised systems, revoke credentials
- Preserve forensics before remediation
- Maintain operations on backup systems
Priority: Protect the uplink command channel above all else. A compromised command path means a compromised spacecraft.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN57
ONBOARD SYSTEM COMPROMISE
INDICATORS OF SPACECRAFT COMPROMISE
- Unauthorized command execution — Commands not matching authorized queue
- Telemetry manipulation — Inconsistencies between correlated parameters
- Payload interference — Unexpected activation, config changes, data exfiltration
POTENTIAL VECTORS
- Ground station lateral movement → uplink injection
- Supply chain compromise in flight software
- Insider threat with command authority
SPACE-SPECIFIC CONSTRAINTS
BWBandwidth
Limited forensic data transfer per pass
LATLatency
Command round-trip delay, no real-time response
WINWindows
Only 8–12 min per pass to act
PHYPhysical
Cannot physically access spacecraft
MISSION QUESTION
Spacecraft executing unauthorized commands. 7-minute pass to respond. Safe-mode (shutting down mission) or targeted remediation (risking adversary completion)? Defend your choice.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN58
CYBER INCIDENT RESPONSE: ADAPTED FOR SPACE
METEORSTORM AN:DET rules, correlated telemetry, behavioral monitoring across all segments. Space constraint: Detection must happen within the pass window or autonomous onboard rules must trigger.
Isolate ground systems, revoke credentials, emergency command authentication, suspend non-essential ops. Space constraint: Must be executed before LOS — autonomous safing rules critical.
Remove attacker access, validate onboard software integrity, rotate cryptographic keys and tokens. Space constraint: Software validation requires dedicated downlink bandwidth.
Restore from backups, re-establish trusted command path, verify baselines match Domain 6, resume operations. Space constraint: Recovery may span multiple orbital passes.
METEORSTORM Function 5 — Adversary Management: Document TTPs, update threat models, share via MISP/collective defense.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN59
STARCOM-LEO: FULL CYBER IR WALKTHROUGH
All ten domains converge in this integrated cyber IR response:
| IR Phase | Domain Contribution | Action | METEORSTORM Tag |
| Detection | Domain 6 baselines + Domain 4 rules | Ground auth anomaly triggered by AN:DET rule | SEG:Ground > AN:DET > AN:IOC |
| Classification | Domain 9 discrimination | Confirmed cyber, not operational — behavioral match to SPARTA SA-0003 | AN:IOA / SPARTA SA-0003 |
| Containment | Domain 7 operations | Emergency command authentication activated, non-essential ops suspended | SVC:Control > AST:SW:Auth |
| Eradication | Session 1 decomposition | Compromised ground systems isolated, flight software hash verified | SEG:Ground > AST:SW:FSW |
| Recovery | Domain 8 payload | Mission restored, payload recalibrated, Domain 6 baselines re-verified | AST:HW:Payload > AN:IOC |
| Reporting | METEORSTORM taxonomy | Complete MISP-ready report for collective defense sharing | Full taxonomy chain |
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN60
MISSION 10 EXERCISE: RED VS. BLUE
⏱ 15 MINUTES — CULMINATING EXERCISE
🔵 BLUE TEAM: DEFEND
🔴 RED TEAM: ATTACK
- Detect attack indicators across ground, link, and space segments
- Classify and prioritize using METEORSTORM taxonomy (AN:IOA, AN:IOC, AN:DET)
- Execute detection-containment-eradication-recovery cycle
- Coordinate all four team roles simultaneously
- Maintain mission continuity throughout the response
- Document all actions for post-incident reporting and collective defense
Deliverable: Comprehensive cyber IR report — attack timeline, SPARTA techniques, METEORSTORM-tagged assets, response actions, detection improvements, collective defense recommendations.
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN61
MISSION 10 CHECKPOINT
CHECKPOINT Q1
What makes satellite cyber IR fundamentally different from traditional IT IR? Name three space-specific constraints and explain how each affects the DCER cycle.
CHECKPOINT Q2
How does METEORSTORM attack path mapping from Session 1 inform real-time detection in Zendir.io? Trace a specific attack path from SEG:Ground through to AN:IOA.
CAPSTONE ACTIVITY (5 MIN)
Produce a comprehensive cyber IR report: attack timeline, SPARTA techniques used, METEORSTORM-tagged assets, response actions taken, detection improvements identified, and collective defense recommendations for MISP sharing.
MISSION QUESTION
After the exercise, your IR report reveals the adversary exploited a gap between your ground and space detection coverage — a seam between two METEORSTORM segments. How does your Session 1 decomposition need to evolve to close this gap?
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN62
MISSION 10 ASSESSMENT RUBRIC
| Criterion | Exemplary (4) | Proficient (3) | Developing (2) | Beginning (1) |
|---|
Cyber Attack Detection & Analysis Detects indicators, maps attack path, applies METEORSTORM taxonomy | Detects all indicators across segments, correct attack path mapping with full METEORSTORM taxonomy | Detects primary indicators, maps attack path with correct taxonomy | Detects some indicators, incomplete attack path or taxonomy gaps | Cannot detect cyber indicators or map attack paths |
Incident Response Execution Complete DCER cycle, team coordination, mission continuity | Complete DCER cycle adapted for space, effective team coordination, mission continuity maintained | Core IR phases executed, adequate coordination, reasonable mission impact | Partial response, significant containment/recovery gaps | Cannot execute structured cyber IR |
Reporting & Collective Defense Comprehensive report, METEORSTORM tags, detection improvements, MISP-ready | Comprehensive report, complete METEORSTORM tags, detection improvements, MISP-ready for collective defense | Adequate report, correct taxonomy, basic detection improvements | Incomplete report, partial taxonomy, vague improvements | Cannot produce structured cyber IR report |
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN63
MISSION 10 SCORE CARD
⚔
DOMAIN 10: THUNDERDOME
Pass: ≥ 6/12 (50%) | No domain below pass threshold for credential
SCOR Practitioner — Session 2
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN64
COURSE DEBRIEF & COMPOSITE SCORING
SESSION 2 COMPOSITE
Credential threshold: ≥ 45/60 (75%) with no individual domain below 6/12 (50%). All 10 domains must achieve pass threshold.
DEBRIEF DISCUSSION
- Key lessons from the THUNDERDOME exercise
- Strongest domain performance and why
- Areas for continued development
- How METEORSTORM integrates across all 10 domains
DOMAIN SCORING SUMMARY
| Domain | Session | Max | Pass |
| 1. BLUEPRINT | S1 | 12 | 6 |
| 2. PANORAMA | S1 | 12 | 6 |
| 3. SENTINEL | S1 | 12 | 6 |
| 4. TRIPWIRE | S1 | 12 | 6 |
| 5. LIGHTHOUSE | S1 | 12 | 6 |
| 6. OVERWATCH | S2 | 12 | 6 |
| 7. HELIOS | S2 | 12 | 6 |
| 8. APERTURE | S2 | 12 | 6 |
| 9. SAFEGUARD | S2 | 12 | 6 |
| 10. THUNDERDOME | S2 | 12 | 6 |
MISSION COMPLETE
SCOR Practitioner — Full Spectrum Space Cybersecurity Professional
✓ BLUEPRINT
✓ PANORAMA
✓ SENTINEL
✓ TRIPWIRE
✓ LIGHTHOUSE
✓ OVERWATCH
✓ HELIOS
✓ APERTURE
✓ SAFEGUARD
✓ THUNDERDOME
You have completed all ten knowledge domains of the SCOR Practitioner programme. You are now a Full Spectrum Space Cybersecurity Professional.
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN | Version 1.0