The Cyber Readiness Center’s high-performance mobile cyber range is a secure and controlled virtual environment used for cybersecurity training and exercises. A turn-key solution for education and training exercises, the mobile cyber range is a fully-transportable self-contained system. In fact, the only things we require from you are electrical outlets and classroom space!
Boost interaction and engagement with the mobile cyber range
The mobile cyber range offers the ability to emulate a live environment containing simulated users interacting with company assets in real-time. As a result, the mobile cyber range to avoids a “stale” environment by constantly immersing and challenging participants. While, traditional classroom training methods fail to allow students to apply the concepts learned, the interactive experience of the mobile cyber range provides an ideal environment to experiment and practice.
Provide your IT staff with hands-on real-world experiences
The mobile cyber range comes configured with a variety of common cyber-attacks which can be triggered in real-time or combined and scheduled as part of a larger scenario. Additionally, the topology of our cyber range and our simulated attacks give participants experience re-configuring “live” networks to meet “customer” needs and secure against threats..
Real attacks on real environments
Because attackers are always searching for new ways to penetrate your cyber defenses and access your systems and data. The mobile range generates real threat-actor tactics to observe and practice defense, response, and recovery from a variety of common scenarios. The mobile cyber range is also customizable with real data and applications from your environment for an unparalleled level of realism.
- DDoS/DoS (Distributed Denial-of-Service/Denial-of-Service) Attacks
- Email Phishing and Spam attacks
- Data Exfiltration
- Website Defacement/Cross Site Scripting (XSS)
- Malware/Ransomware mitigation
- Network Analysis and Intrusion Detection
- Advanced Persistent Threat tactics
For more information about the CTER cyber range program contact:
Andrew Jarrett, Applied Cybersecurity Program Manager
Funding for the development of the CTER was provided by the Texas A&M System Office of Information Security and the Texas A&M System Chief Information Security Officer.