Tech Data offers a variety of Range environments for you to play and learn. A “Range” is nothing more than a grouping of “Targets” where Targets are groups of virtual machines or network devices that can be accessed remotely from your personal laptop for the purpose of free-play, structured training classes or vendor technology experimentation.
Tech Data offers the following Cyber Ranges:
Beginner
Those interested in starting a new career in cyber security are first introduced to the basic concepts and terminology within the industry. Educational materials are available in both self-paced learning and more traditional educational contexts. Education is backed with hands-on exercises against real world environments. These hands-on sessions are guided by educators and provide the student with real world feedback and results. There is no substitute for practical hands-on experience.
The following targets are available in the Beginner Range:
Target Name | Description |
---|---|
Mutillidae | Mutillidae is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiasts. (Walk-through guides and tutorials included inside the target). |
To use the Beginner range, send an SMS text message to the Cyber Range phone number with the following text:
enroll beginner access <your IP address> |
---|
Intermediate
Those interested in advancing their education will continue to receive re-enforcement of the basic concepts and terminology within the security industry, but will move more into exploring and experiencing all of those concepts in a hands-on learning environment. This includes both offensive and defensive skills.
Target Name | Description |
---|---|
Election | Election has a heavy focus on enumeration and will introduce the user to leveraging 3rd party code for privilege escalation. There are 2 flags, user and root. |
To use the Intermediate range, send an SMS text message to the Cyber Range phone number with the following text:
enroll intermediate access <your IP address> |
---|
Advanced
To obtain mastery of cybersecurity skills, advanced students will work within a completely hands-on environment and will be working with tools and technologies available on the commercial market. Their education is augmented with real-time industry updates and technology performance data from the Cyber Range’s real world environment. Students in this area are operating in an environment that is comparable to employment as a corporate security professional. They will continue to use and master real world commercial tools, as well as learn the needed skills to work with other security professionals in a team environment. Soft skills, reporting, budgeting and other forms of planning are learned, practiced and reviewed.
Target Name | Description |
---|---|
Node | Node is different than many other CTFs in that it was built on a MEAN stack. The user will have to abuse certain misconfigurations in the stack to get a foothold on the machine and leverage 3rd party code to elevate privileges. There are 2 flags, user and root. |
To use the Advanced range, send an SMS text message to the Cyber Range phone number with the following text:
enroll advanced access <your IP address> |
---|
Real World
Cyber warfare is constantly evolving. Therefore, cyber security professionals must continue their education. Students operating in our real-world environment are participating in a live fire cyber war. It does not get any tougher or real-world than this environment. Students harden and broaden their skills based on real-time experiences and information as it happens.
Targets for the Real World Range will be released soon.
Target Name | Description |
---|---|
Real World | TBD |
To use the Real World range, send an SMS text message to the Cyber Range phone number with the following text:
enroll realworld access |
---|