Cyber Range Workshops
Learn, develop and practice your skills in an ultra-realistic simulated environment
Overview
The Catalyst Cyber Range is an interactive, simulated representation of an organization’s networks, systems, tools, and applications that are connected in a virtual environment. Cyber events and scenarios run inside the virtual environment, allowing Cyber Range participants to react and respond to various cyber threats in an ultra-realistic platform.
Catalyst Cyber Range workshops give you the opportunity to learn, develop and practice your skills in an ultra-realistic simulated environment, allowing you to:
- Experience a real cybersecurity incident (safely)
- Gain hands-on experience using real commercial tools
- Prepare for job interviews with practical experience
- Earn valuable CPEs
- Put your skills to the test
All Catalyst Cyber Range workshops are led by an experienced cybersecurity trainer and include an orientation and debrief to ensure you get the most out of your session.
On completion, all participants earn:
- 3 GIAC CPEs per session. (CPEs for this training have been pre-approved by GIAC and can be claimed under either the “Cyber Ranges” or “Other Industry Training” categories.)
- A Certificate of Completion from Rogers Cybersecure Catalyst.
Put your skills to the test at one of our upcoming sessions
Our sessions are focused on various real-world scenarios that you may encounter as a practicing cyber professional.
Upcoming sessions
More sessions to be announced.
Learn more about each of our upcoming sessions
Our sessions are focused on various real-world scenarios that you may encounter as a practicing cyber professional. Each session costs $430 + HST; you can save 15% by registering for two sessions together ($730 + HST).
Incident Response + Ransomware
Learner Profile: Cybersecurity and IT professionals
Skills developed:
- SIEM monitoring with Splunk
- Firewall monitoring with Palo Alto
- Exploit Frameworks such as Metasploit
- Ransomware toolkits
In this scenario, participants will experience both sides of a breach, holistically building their readiness for cyberattacks. They will start by acting like a hacker, breaking into multiple servers and/or domain controllers. They will then respond to the attack using commercial firewalls and tools. Participants will learn how to detect and identify specific characteristics of an attack.
Incident Response: Identification + Containment
Learner Profile: Cybersecurity and IT professionals
Skills developed:
- SIEM Threat Hunting with Splunk
- Firewall monitoring with Fortigate
- Social Engineering Attack mitigation
- Identification of attacks using Indicators of Compromise
- Remote code Execution exploits
In this scenario, a medical clinic is compromised and data is exfiltrated. Participants will experience this cyber event from the viewpoint of the attacker and the security operation center analyst. Participants will use multiple attack methods including social engineering to gain access to multiple endpoints including medical devices. As security analysts, they will work to identify the threats and contain them using multiple security defensive tools.
Cybersecurity Essentials A
Learner Profile: Professionals with basic Linux and computer networking experience
Skills developed:
- Recon and port scanning
- Metasploit Framework basics
- Hash cracking tools
- Nessus and vulnerability assessment tools
- Wireshark investigations
- Web application tools
In this introductory scenario, participants will start by learning about recon and exploitation using Kali Linux acting like a penetration tester; then moving on to wireshark to do an investigation of digital evidence obtained during a cyber event. Next, a vulnerability assessment is done against a network infrastructure. Moving on, participants will act like a hacker and attempt to exploit a web application using tools found on Kali Linux.