launch.ethicallyhacking.space Open in urlscan Pro
172.67.71.130  Public Scan

Submitted URL: https://ethicallyhacking.space/
Effective URL: https://launch.ethicallyhacking.space/
Submission: On January 02 via api from US — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

Capability Development

Tooling

Digital Products

Partners

About Us

Break Into Orbit


#SPACECOLLECTIVEDEFENSE

Space, Cybersecurity, Operations, and Resilience Platform Professional
(SCOR-P2)™ Community


BREAKING INTO ORBIT

Developing skilled space cybersecurity professionals can be challenging. The
ethicallyHackingSpace(eHs)® community is here to help. Start your journey with
our "Breaking Into Orbit" course. Take this self-paced course and complete the
certification before requesting a seat in one of our live instructor courses.
This ensures you are ready to start your journey and join our community.

Break Into Orbit

This course is our only self-paced AI driven course and all others are virtual
live instructor led or in-person.


SCOR MICRO-CREDENTIALS

Our innovative and currently one-of-a-kind micro-credential solution is emerging
to provide cutting-edge expertise in a flexible format. Whether you're a
seasoned pro or just starting our SCOR-P2™ micro-credentials empower you with
the knowledge and skills to excel in this vital field.

MODULES


COURSES


LEARNING PATHS




FULL SPECTRUM SPACE CYBERSECURITY PROFESSIONAL




SCOR WORK ROLE

This work role is responsible for platform decomposition and analysis to
understand and break down space platforms, identifying exposure and developing
resilience measures. It also involves preparing Space Collective Defense
solutions focused on Collective Development, Research, and Response.
Furthermore, this role directly supports organizational and communal efforts in
space platform Threat Management, Resilience Engineering, and Breach Management.


KNOWLEDGE STATEMENTS




SKILL STATEMENTS




ABILITY STATEMENTS




TASK STATEMENTS


Request Training


SCOR INCIDENT RESPONDER




SCOR WORK ROLE

This work role is responsible for incident response across the SCOR™ domain,
encompassing space platforms and addressing threats such as commercial hybrid
warfare and cross-domain adversary management.


KNOWLEDGE STATEMENTS




SKILL STATEMENTS




ABILITY STATEMENTS




TASK STATEMENTS


Request Training


SCOR SECURITY OPERATIONS ANALYST




SCOR WORK ROLE

The SCOR Security Operations Analyst work role is responsible for Space,
Cybersecurity, Operations, and Resilience (SCOR)™, platform monitoring, incident
detection, and alert triage.


KNOWLEDGE STATEMENTS




SKILL STATEMENTS




ABILITY STATEMENTS




TASK STATEMENTS


Request Training


SCOR RESEARCHER




SCOR WORK ROLE

The SCOR Researcher work role performs Space, Cybersecurity, Operations, and
Resilience (SCOR)™ platform Open-Source Intelligence (OSINT) curation and
authorized ethical bug bounty research to help reduce both organizational and
communal space platform attack surface area.


KNOWLEDGE STATEMENTS




SKILL STATEMENTS




ABILITY STATEMENTS




TASK STATEMENTS


Request Training


SPACE COLLECTIVE DEFENSE TOOLING




LABS

Learn, Apply, Build, Simulate

COLLECTIVE DEVELOPMENT

The ethicallyHackingspace (eHs)® Learn Apply Build Simulate (LABS) framework
embodies a comprehensive approach to advancing skills and knowledge in the
Space, Cybersecurity, Operations, and Resilience (SCOR)™ domains. Our research
team is leveraging generative artificial intelligence to curate and align work
roles, knowledge statements, skill statements, ability statements, and task
statements from key standards and frameworks, including CCSDS, NIST, ECSS, NASA,
ESA, and others. This dynamic synthesis ensures alignment with both industry and
mission-critical needs. Beginning in 2025, the results of this initiative will
be published quarterly, offering community members cutting-edge insights and
resources to drive innovation and operational excellence within the eHs®
ecosystem.


SUV

Space Universal Visualization

COLLECTIVE RESEARCH

The ethicallyHackingspace (eHs)® Space Universal Visualization (SUV)™ framework
is a global lexicon designed to standardize and enhance visualization across the
space domain. Built from the ongoing curation of existing space references and
enriched with the assistance of AI-powered "diagrams as code," SUV™ aims to
create a cohesive, accessible visualization framework. This dynamic initiative
leverages generative AI to integrate key insights from authoritative sources,
ensuring relevance and precision. Starting in 2025, the SUV™ framework will be
updated and released quarterly, providing the community with progressive
insights and tools to foster global collaboration and innovation in the space
industry.


SITH

Space Interactive Threat Hub

COLLECTIVE RESPONSE

The ethicallyHackingspace (eHs)® Space Interactive Threat Hub (SITH)™ leverages
generative AI and expert curation to produce primary intelligence requirements,
detection engineering content, and threat intelligence telemetry solutions.
CCSDS, NASA, ESA, NIST, and ECSS reference are also used as a basis for this
content. Beginning in 2025, the SITH® framework will release its updates on a
quarterly basis, offering the community a robust toolkit to address evolving
challenges and enhance resilience in the increasingly complex space threat
environment.




DECOMPOSITION AND ANALYTIC TOOLING




METEOR STORM

Our Multiple Environment Threat Exposure of Resources, Space Threats, and
Operational Risks to Missions (METEORSTORM)™ framework provides a way to perform
pragmatic modeling of space platforms. This includes converged systems with
assets like Drones, RF, 5G, Narrow Band IoT, LoRa/LoRaWAN, legacy space, new
space, deep space, and even aquatic elements.

METEORSTORM™ bridges and enhances disparate frameworks, such as SPARTA, Space
Shield, MITRE FIGHT, MITRE ATT&CK, and MITRE ATLAS, for decomposition and
enrichment analytics.

Objective: Modeling the effects of and potential resilience measures for:

 * Kinetic threats
 * Non-kinetic threats
 * Electronic Warfare
 * Cyber Warfare
 * Other exposure scenarios




LAYER ONE: PRIMARY CAPABILITY ENVIRONMENT




LAYER TWO: SEGMENT




LAYER THREE: SERVICE




LAYER FOUR: ASSET




LAYER FIVE: ANALYTIC





SCOR TOOLING




CTEM

Continuous Threat Exposure Management

THREAT MANAGEMENT

Our SCOR Continuous Threat and Exposure Management (CTEM) research builds on the
foundational pillars of space collective defense: collective development,
collective research, and collective response. This approach fosters a
collaborative ecosystem where organizations and researchers unite to strengthen
space cybersecurity resilience. CTEM emphasizes simplifying and streamlining the
convergence of legacy processes—such as vulnerability management and
configuration management—into a cutting-edge, prioritized exposure management
strategy. By focusing on actionable, risk-informed practices, CTEM empowers
stakeholders to address critical exposures more effectively, reducing complexity
while enhancing defense readiness in the rapidly evolving threat landscape. This
framework reflects a commitment to innovation and shared knowledge, ensuring
that the space community remains agile and prepared for emerging challenges.


S3C

Secure Solution Supply Chain

RESILIENCE ENGINEERING

Our SCOR Secure Solution Supply Chain (S3C) research addresses the critical
challenge of resilience engineering in the space domain. By focusing on bridging
the gap with Space Application Security Posture Management (SASPM)—a complex and
significant undertaking—this research aims to strengthen defenses across the
supply chain. S3C research examines the hardware, firmware, software, signals,
and data that adversaries can exploit in their campaigns, while also exploring
non-adversarial issues that can lead to suboptimal failure modes. This effort
builds on the foundational pillars of space collective defense: collective
development, collective research, and collective response. By leveraging these
principles, the research team validates realistic SCOR-S3C work packages,
ensuring actionable, operationally relevant outcomes. Through this approach, S3C
not only enhances resilience against adversarial threats but also addresses
systemic vulnerabilities and operational inefficiencies, contributing to the
overall security and stability of the space ecosystem.


IRO

Incident Response Operations

BREACH MANAGEMENT

Our SCOR Incident Response Operations research focuses on operationalizing the
products generated by our Space Interactive Threat Hub (SITH)™. This effort is
uniquely challenging due to the complexity of space platforms, the diverse
nature of organizations, and the convergence of hybrid commercial and government
solutions. To address these challenges, our research aims to develop modular
"bundles" of resources—including primary intelligence requirements, detection
engineering content, and threat telemetry instrumentation packages—that can be
rapidly applied across various environments. This initiative builds on the
foundational principles of space collective defense, leveraging collective
development, collective research, and collective response to foster resilience
and agility. With a strong emphasis on community-level information exchange, our
approach ensures that actionable insights and resources are shared broadly,
enabling faster incident response and more effective threat mitigation. By
streamlining these critical operations, SCOR Incident Response Operations seeks
to empower organizations with the tools they need to navigate the dynamic and
interconnected landscape of space security.




DIGITAL PRODUCTS

Explore our collection of free digital skilltainment focused on space
cybersecurity operations and resilience. These publications provide cutting-edge
insights, best practices, and emerging trends in the field of space security and
defense.


H4CK32N4U75

Latest in ethical hacking and cybersecurity

Join Now


INTERSTELLAR INTEGRITY (I2)

Space security and defense insights

Read Now


H4CK32N4U75 ARCADE

Interactive space security games and challenges

Play Now



ABOUT US


UNITED STATES

We are currently working with our US partners and allies through a non-profit
incubator. D2 Team CORP 501 (c)(3). This incubator allows our project to
democratize Space, Cybersecurity, Operations, and Resilience through online
events, in-person events, and community product offerings. The
ethicallyHackingspace (eHs)® project is making a positive impact for the US and
its allies.


LUXEMBOURG

We are currently working with our EU partners and allies through a non-profit
incubator. 303 Overwatch A.S.B.L. This incubator allows our project to
democratize Space, Cybersecurity, Operations, and Resilience through online
events, in-person events, and community product offerings. The
ethicallyHackingspace (eHs)® project is making a positive impact for the EU and
its allies.


OUR STORY

We are a workforce capability development and tooling project supported by two
incubators. We started in late 2020 and were founded by a former US Cyberspace
Operations Officer and space cybersecurity professional who now focusses on
consulting for commercial and government customers. We were the first and are
currently the only provider of Space, Cybersecurity, Operations, and Resilience
micro-credentials.

© 2025 ethicallyHackingspace (eHs)®. All rights reserved.