The Cyber Readiness Center’s high-performance mobile cyber range is a secure and controlled virtual training environment. The mobile cyber range is a fully-transportable self-contained turn-key solution for educational and training exercises. In fact, the only things we require from you are electrical outlets and classroom space!
Boost interaction and engagement with the mobile cyber range
The mobile cyber range emulates a live environment containing simulated users interacting with company assets in real-time. As a result, the mobile cyber range avoids a “stale” environment by constantly immersing and challenging participants. While traditional training methods don’t allow students to apply concepts they’ve learned, the mobile cyber range provides an ideal interactive environment to experiment and practice.
Provide your IT staff with hands-on real-world cybersecurity training
The mobile cyber range comes configured with a variety of common cyber-attacks which can be triggered in real-time or combined and scheduled as part of a larger scenario. Additionally, the topology of our cyber range and our simulated attacks give participants experience re-configuring “live” networks to meet “customer” needs and secure against threats. If you’re interested in other training opportunities provided by us, click here!
Real attacks on real environments
Attackers are always searching for new ways to penetrate your cyber defenses and access your systems and data, for instance, the Sunburst attack. Because the mobile range generates real threat-actor tactics to observe and practice defense, response, and recovery from a variety of common scenarios. The mobile cyber range is also customizable with real data and applications from your environment for an unparalleled level of realism.
- DDoS/DoS (Distributed Denial-of-Service/Denial-of-Service) Attacks
- Email Phishing and Spam attacks
- Data Exfiltration
- Website Defacement/Cross Site Scripting (XSS)
- Malware/Ransomware mitigation
- Network Analysis and Intrusion Detection
- Advanced Persistent Threat tactics
The Cybersecurity Training and Exercise Range is a part of the applied cybersecurity program’s other services including cybersecurity assessments, planning, training, and exercises.
For more information about the CTER cyber range program contact:
Andrew Jarrett, Applied Cybersecurity Program Manager
Funding for the development of the CTER was provided by the Texas A&M System Office of Information Security and the Texas A&M System Chief Information Security Officer.