List of Ranges and Targets

Tech Data offers a variety of Range environments for you to play and learn. A “Range” is nothing more than a grouping of “Targets” where Targets are groups of virtual machines or network devices that can be accessed remotely from your personal laptop for the purpose of free-play, structured training classes or vendor technology experimentation.

Tech Data offers the following Cyber Ranges:

Beginner

Those interested in starting a new career in cyber security are first introduced to the basic concepts and terminology within the industry. Educational materials are available in both self-paced learning and more traditional educational contexts. Education is backed with hands on exercises against real world environments. These hands on sessions are guided by educators and provide the student with real world feedback and results. There is no substitute for practical hands on experience.

The following targets are available in the Beginner Range:

Target NameDescription
Mr. RobotThis basic “Capture the Flag” target allows guests to exercise several methodologies to obtain 3 flags, which are all MD5 hashes. Obtaining the flags will requite several tools which are used in basic penetration testing and should teach common exploitation techniques.
Mutillidae Mutillidae is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiasts. (Walk-through guides and tutorials included inside the target).
Rickdiculously Easy 1This is a basic capture the flag (CTF) scenario on a Fedora server. This is called a boot2root challenge because the goal is to gain root privileges and find the flag.

To use the Beginner range, send an SMS text message to the Cyber Range phone number with the following text:

enroll beginner
access <your IP address>

Intermediate

Those interested in advancing their education will continue to receive re-enforcement of the basic concepts and terminology within the security industry, but will move more into exploring and experiencing all of those concepts in a hands-on learning environment. This includes both offensive and defensive skills.

Targets for the Intermediate Range will be released soon.

To use the Intermediate range, send an SMS text message to the Cyber Range phone number with the following text:

enroll intermediate
access <your IP address>

Advanced

To obtain mastery of cybersecurity skills, advanced students will work within a completely hands on environment and will be working with tools and technologies available on the commercial market. Their education is augmented with real-time industry updates and technology performance data from the Cyber Range’s real world environment. Students in this area are operating in an environment that is comparable to employment as a corporate security professional. They will continue to use and master real world commercial tools, as well as learn the needed skills to work with other security professionals in a team environment. Soft skills, reporting, budgeting, and other forms of planning are learned, practiced, and reviewed.

Targets for the Advanced Range will be released soon.

To use the Advanced range , send an SMS text message to the Cyber Range phone number with the following text:

enroll advanced
access <your IP address>

Jedi

Cyber warfare is constantly evolving. Therefore, cyber security professionals must continue their education. Students operating in our real-world environment are participating in a live fire cyber war. It does not get any tougher or real-world that this environment. Students harden and broaden their skills based on real-time experiences and information as it happens.

Targets for the Jedi Range will be released soon.

To use the Jedi range , send an SMS text message to the Cyber Range phone number with the following text:

enroll jedi
access <your IP address>