JU Cyber RangeCybersecurity Corporate Training

Cyber Range classroom with professor and two students.

Filling the Cybersecurity Skills Gap

The Center of Cybersecurity at ̽»¨×å provides a cutting-edge environment to help cybersecurity organizations train in the most advanced settings and experience real-life cyber-attacks.

 

Features:

  • Hyper-Realistic Simulation
  • Complete Training Environment
  • Full Flexibility – To Continuously Suit Your Needs
  • Market-leading Security Products 

Blue Team icon

Blue Team Exercises

 

Purple Team icon

Purple Team
Exercises

 

Capture the Flag icon

Capture the Flag Exercises

Red Team icon

Red Team Exercises

 

Red vs Blue Team icon

Red Team vs. Blue Team Exercises

 

Enhance Tabletop icon

Enhance Tabletop Exercises

Jumpstart Your Cybersecurity Expertise With Hands-On Training

Our Cybersecurity Corporate Training program offers a breadth of services to help you hire, train, upskill, and retain. Live-fire cyberattack simulations enable the whole security team to work together to defend against the latest threats. 


Hands-on training modules improve cybersecurity skills and abilities. Our training program uses the first hyper-realistic cyber simulation platform, serving as an advanced, simulated training environment for cybersecurity. 

 

Skill Bundle Examples

  • Web Application Hardening
  • Web Application Pentesting
  • Advanced Web App Pentesting
  • Linux Fundamentals
  • Cryptography
  • Digital Forensics Basic
  • Ethical Hacker Essentials
  • Digital Forensics Network
  • Network Essentials
  • Pentesting & Network Exploitation
  • Security Essentials
  • Security Professional Essentials

 

Instructor-led training sessions  

  • Each experience is customized based on the skills and experience of the individuals in the session. 

  • Each experience can be conducted remotely or on-premise. 

 

 

Live Attack Scenarios Examples

  • Apache Shutdown
  • Trojan Data Leak
  • SQLi Domain Hijacking
  • Web Defacement
  • Ransomware
  • WMI Worm
  • Java NMS Kill
  • DDOS SYN Flood
  • DB Dump via FTP Exploit
  • Bitminer
  • Security Essentials
  • Security Professional Essentials

 

Self-paced training Sessions 

  • Self-paced sessions allow your employees to work at their own pace on specific attack scenarios.
  • Individuals can work on specific areas for improvement.
  • Participants can revisit concepts and activities from an instructor-led session.

 

Thank you for being a part of our Cybersecurity panel event!

The Cyber Range at ̽»¨×å is the hub of cybersecurity knowledge and training for Northeast Florida.  We look forward to partnering with you on future events.

Thanks to Kivu for sponsoring the panel event on Wednesday Sept 27th, 2023.  You can hear more from Kivu CEO Shane Sims in the Podcast linked below. 

Podcast from Shane Sims CEO of KIVU Consulting

 

 

Contact us to schedule a DemoEvery Organization is Different

Our programs are completely flexible and allow you to evolve your training program over time in order to ensure the most effective implementation. 

Contact Information Center of Cybersecurity

Phone: (904) 256-7308
Email: mzeng@ju.edu

Quick Links