MISA-Catalyst Cyber Range Program
Technical cyber range training tailored for municipal IT professionals.
Overview
The MISA-Catalyst Cyber Range program brings together MISA’s insights on the challenges faced by municipalities with Rogers Cybersecure Catalyst’s expertise in cybersecurity training and its unique cyber range platform. The cyber range platform allows participants to react and respond to various cyber threats within an ultra-realistic environment – one that looks like your organization’s digital network architecture.
Program Streams
The program is offered via two streams – Beginner and Intermediate – each comprising two cyber range workshops led by an experienced cybersecurity trainer. Learners will be walked through key cybersecurity concepts, with discussion centered around the municipal context, while getting a hands-on experience in the Catalyst Cyber Range. Participants will undergo a short preparatory session in advance of their cyber range experience via the ClickArmor (a Catalyst partner) platform.
The program costs $945 per seat, with a maximum of 20 participants per cohort. There is a 10% discount when signing up for both streams. Participants will be tested on their learnings and receive a certificate of completion at the conclusion of the program.

Programming has been developed jointly by MISA Ontario and the Catalyst to respond to the specific needs of municipal IT professionals. The Beginner stream is designed for municipal IT professionals who are new to cybersecurity, and will include two three-hour cyber range workshops (Cybersecurity Essentials A and B).
Cybersecurity Essentials A
Description | Skills Developed |
---|---|
In this scenario participants will go through four modules relating to cybersecurity. They will start by learning about recon and exploitation using Kali Linux acting like a penetration tester. Then moving on to wireshark to do an investigation of digital evidence obtained during a cyber event. In module 3 a vulnerability assessment is done against a network infrastructure. Finally in module 4, participants will act like a hacker and attempt to exploit a web application using tools found on Kali Linux. |
|
Cybersecurity Essentials B
Description | Skills Developed |
---|---|
In this scenario participants will go through four modules relating to cybersecurity. They will start by using digital evidence obtained on a compromised server. The participant will use volatility to do some forensics on a memory dump. In module 2 the participant will act like a hacker running an exploit against Active Directory. Participants will then move on to escalating privileges with the domain and compromising new accounts. In module 4 the participant will receive multiple pieces of digital evidence and investigate an exfiltration of data trying to determine when and how it happened. |
|
Programming has been developed jointly by MISA Ontario and the Catalyst to respond to the specific needs of municipal IT professionals. The Intermediate stream is designed for municipal IT professionals who have some knowledge of cybersecurity, and will focus on incident response. The stream consists of two three-hour cyber range workshops (Incident Response and Ransomware, and Incident Response: Identification & Containment).
Incident Response and Ransomware
Description | Skills Developed |
---|---|
This scenario replicates an enterprise environment, with a LAN, DMZ and SOC. The Red Team needs to find a vulnerability on the WordPress Server in the DMZ and then find a way to pivot from the DMZ to the LAN. The Blue team needs to monitor Palo Alto, DMZ server and Windows logs from their Splunk console in the SOC to discover alerts and IOCs. They should be able to detect the attackers’ attempt to gain control of the victim’s machine in the LAN via a reverse-shell. Finally, the red team escalates with a ransomware injection which the blue team must detect and respond to. |
|
Incident Response: Identification and Containment
Description | Skills Developed |
---|---|
In this scenario a medical clinic is compromised to gain access to secure records and exploit vital medical equipment. Participants will experience this cyber event from the viewpoint of the attacker, soc analyst and cybercrime investigators. Participants will use multiple attack methods including social engineering to gain access to multiple endpoints including medical devices. As security analysts they will work to identify the threats and contain them using multiple security defensive tools including SIEM and enterprise firewall. |
|
Program Partners

Municipal Information Systems Association, Ontario (MISA Ontario) is a non-profit organization that provides technology focused online resources, directories, and events targeted to municipalities of all sizes. Their objective is to foster an engaged and active community of municipal professionals, at all levels, to share information, experiences and promote municipal IT practices in order to provide better and more cost-effective services to municipal taxpayers and clients. We represent 200+ municipalities and organizations, representing 1400+ dedicated professionals working towards more effective government.

The program’s online interactive platform is provided by Click Armor, a Rogers Cybersecure Catalyst partner and Catalyst Cyber Accelerator alumni. Click Armor is an interactive security awareness platform that creates more secure employee behavior. Combining the power of the Click Armor platform with the Catalyst Cyber Range provides learners with a complete learning experience.