Tech Data offers a variety of Range environments for you to play and learn. A “Range” is nothing more than a grouping of “Targets” where Targets are groups of virtual machines or network devices that can be accessed remotely from your personal laptop for the purpose of free-play, structured training classes or vendor technology experimentation.

Tech Data offers the following Cyber Ranges:

Beginner

Those interested in starting a new career in cyber security are first introduced to the basic concepts and terminology within the industry. Educational materials are available in both self-paced learning and more traditional educational contexts. Education is backed with hands-on exercises against real world environments. These hands-on sessions are guided by educators and provide the student with real world feedback and results. There is no substitute for practical hands-on experience.

The following targets are available in the Beginner Range:

Target Name Description
Mutillidae Mutillidae is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiasts. (Walk-through guides and tutorials included inside the target).
Rickdiculously Easy 1 This is a basic capture the flag (CTF) scenario on a Fedora server. This is called a boot2root challenge because the goal is to gain root privileges and find the flag.

To use the Beginner range, send an SMS text message to the Cyber Range phone number with the following text:

enroll beginner
access <your IP address>

Intermediate

Those interested in advancing their education will continue to receive re-enforcement of the basic concepts and terminology within the security industry, but will move more into exploring and experiencing all of those concepts in a hands-on learning environment. This includes both offensive and defensive skills.

Target Name Description
Election Election has a heavy focus on enumeration and will introduce the user to leveraging 3rd party code for privilege escalation. There are 2 flags, user and root.

To use the Intermediate range, send an SMS text message to the Cyber Range phone number with the following text:

enroll intermediate
access <your IP address>

Advanced

To obtain mastery of cybersecurity skills, advanced students will work within a completely hands-on environment and will be working with tools and technologies available on the commercial market. Their education is augmented with real-time industry updates and technology performance data from the Cyber Range’s real world environment. Students in this area are operating in an environment that is comparable to employment as a corporate security professional. They will continue to use and master real world commercial tools, as well as learn the needed skills to work with other security professionals in a team environment. Soft skills, reporting, budgeting and other forms of planning are learned, practiced and reviewed.

Target Name Description
Node Node is different than many other CTFs in that it was built on a MEAN stack. The user will have to abuse certain misconfigurations in the stack to get a foothold on the machine and leverage 3rd party code to elevate privileges. There are 2 flags, user and root.

To use the Advanced range, send an SMS text message to the Cyber Range phone number with the following text:

enroll advanced
access <your IP address>

Jedi

Cyber warfare is constantly evolving. Therefore, cyber security professionals must continue their education. Students operating in our real-world environment are participating in a live fire cyber war. It does not get any tougher or real-world than this environment. Students harden and broaden their skills based on real-time experiences and information as it happens.

Targets for the Jedi Range will be released soon.

Target Name Description
Jedi TBD

To use the Jedi range, send an SMS text message to the Cyber Range phone number with the following text:

enroll jedi
access <your IP address>