fbpx
Is Your Team Ready to Face a Cyber-Attack?

Image of lady at computer

Your information technology team’s speed of response, ability to coordinate and their understanding of your system’s strengths and weaknesses will determine their ability to fend off and defend against a cyber-attack.

Invest in a Cyber Training Membership through UTSA’s Cyber Range in the Carlos Alvarez College of Business.

  • Prepare and upskill your IT team so that they are ready to work together and know their strengths and weaknesses before an attack happens
  • Improve your team’s speed of response to a cyber-attack and reduce downtime through live-fire simulations
  • Earn Continuing Education Units (1 CEU = 8 hours of time on the Cyber Range)

Continuing Education Units

Yearlong Cyber Training Membership

Cyber Training Session in the UTSA Cyber Range

Cyber Training Sessions

Receive yearlong unlimited access to join any live Cyber Range training sessions led by a UTSA trainer. Sessions simulate a live-fire cyber-attack and you are able to join either online or in-person.

The retail price of a cyber training session is $500 for non-members.

Image of Cyber Training screen at UTSA Cyber Range

Private Training Sessions

Members receive a yearlong 50% discount on all private training sessions. Preselect or customize an attack scenario to help your team prepare to work together as a cohesive unit.

The retail price of a private session is $3,000; members save $1,500 per session.

Image of UTSA Cyber Range Team

Hackathon Team Registration

Enter a team of 5-7 people into our annual Hackathon. Challenge your team to work together as a cohesive unit and reinforce their cyber training as they compete against other teams.

Image of laptop computer

On-Demand Labs and Courses

Receive yearlong discounts on access to 24/7 on-demand cyber training, your cost and discount will vary based on the course or lab packages selected.

Image of UTSA Cyber Range Tour

Quarterly Membership Conferences 

Attend quarterly conferences with other members to learn about new technologies, engage in table-top exercises, discuss incident response plans and hear vendors present their latest security tools.

Image in UTSA Cyber Range, San Antonio Texas

Cyber Range Certificates of Completion

Capture achievements with Cyber Range Certificates of Completion. Participants will earn certificates based on their time on the range and for successfully completing scenarios in any of the groupings listed below.

Examples of Cyber Range Scenarios

Cyber Range Attack Scenarios

Scenario Complexity Time (hrs)
Apache Shutdown Medium 3
DDOS SYN Flood Easy 1
SQL Injection Medium 2
Trojan Data Leakage Medium 3
Scenario Complexity Time (hrs)
Apache Shutdown Medium 3
DB Dump via FTP Exploit Medium 4
Java Sendmail Hard 4
Ransomware Hard 4
Security Information and Event Management (SIEM) Disable Hard 3
Trojan Share Privilege Escalation Hard 4
WMI Worm Hard 4
Web Proxy Auto Discovery (WPAD) Man-in-the-Middle Hard 3
Scenario Complexity Time (hrs)
Supervisory Control and Data Acquisition (SCADA) Field to Field Hard 4
SCADA HMI Medium 3
SCADA VPN Easy 3
Scenario Complexity Time (hrs)
Apache Shutdown Medium 3
DB Dump via FTP Exploit Medium 4
Java Network Management System (NMS) Shutdown Medium 3
Java Sendmail Hard 4
Web Defacement Easy 2
Scenario Complexity Time (hrs)
DDOS DNS Amplification Medium 2
DDOS SYN Flood Easy 1
WMI Worm Hard 4
Web Proxy Auto Discovery (WPAD) Man-in-the-Middle Hard 3
Scenario Complexity Time (hrs)
DDOS DNS Amplification Medium 2
Ransomware Hard 4
Security Information and Event Management (SIEM) Disable Hard 3
Trojan Data Leakage Medium 3
Trojan Share Privilege Escalation Hard 4
WMI Worm Hard 4
Web Proxy Auto Discovery (WPAD) Man-in-the-Middle Hard 3

The Cyber Range Difference

Real-World Network.
Real-World 
Security Tools.
Real-World 
Simulated Attacks.

Real-World Experience that you can count on when it matters most.

Keep your cybersecurity skills current in the UTSA Cyber Range at the Carlos Alvarez College of Business. The cyber range is a virtualized corporate network with over 60 components including application, database and email servers, as well as workstations and simulated internet segment. The virtual Security Operations Center (SOC) features market-leading security products to provide hands-on experience with the same tools cyberdefenders use on the job.

Cyber Training Membership Inquiries

In partnership with:

X