Hands-on Cyber Range Training for IT Professionals
Your information technology team’s speed of response, ability to coordinate and their understanding of your system’s strengths and weaknesses will determine their ability to fend off and defend against a cyber-attack.
Scenario | Complexity | Time (hrs) |
---|---|---|
Apache Shutdown | Medium | 3 |
DDOS SYN Flood | Easy | 1 |
SQL Injection | Medium | 2 |
Trojan Data Leakage | Medium | 3 |
Scenario | Complexity | Time (hrs) |
---|---|---|
Apache Shutdown | Medium | 3 |
DB Dump via FTP Exploit | Medium | 4 |
Java Sendmail | Hard | 4 |
Ransomware | Hard | 4 |
Security Information and Event Management (SIEM) Disable | Hard | 3 |
Trojan Share Privilege Escalation | Hard | 4 |
WMI Worm | Hard | 4 |
Web Proxy Auto Discovery (WPAD) Man-in-the-Middle | Hard | 3 |
Scenario | Complexity | Time (hrs) |
---|---|---|
Supervisory Control and Data Acquisition (SCADA) Field to Field | Hard | 4 |
SCADA HMI | Medium | 3 |
SCADA VPN | Easy | 3 |
Scenario | Complexity | Time (hrs) |
---|---|---|
Apache Shutdown | Medium | 3 |
DB Dump via FTP Exploit | Medium | 4 |
Java Network Management System (NMS) Shutdown | Medium | 3 |
Java Sendmail | Hard | 4 |
Web Defacement | Easy | 2 |
Scenario | Complexity | Time (hrs) |
---|---|---|
DDOS DNS Amplification | Medium | 2 |
DDOS SYN Flood | Easy | 1 |
WMI Worm | Hard | 4 |
Web Proxy Auto Discovery (WPAD) Man-in-the-Middle | Hard | 3 |
Scenario | Complexity | Time (hrs) |
---|---|---|
DDOS DNS Amplification | Medium | 2 |
Ransomware | Hard | 4 |
Security Information and Event Management (SIEM) Disable | Hard | 3 |
Trojan Data Leakage | Medium | 3 |
Trojan Share Privilege Escalation | Hard | 4 |
WMI Worm | Hard | 4 |
Web Proxy Auto Discovery (WPAD) Man-in-the-Middle | Hard | 3 |
© 2023 The University of Texas at San Antonio | One UTSA Circle San Antonio, TX 78249 | Information: (210) 458-4011