CYRIN - Where Education Comes to You

Featured Promotion

CYRIN - Where Education Comes to You - We’re Creating Some New Options 

CYRIN Cyber Range has something new - including a new catalog indexing system.

What does that mean for you? That means we have over 50 Labs, Exercises, Attacks and Courses. And our new indexing system allows you to pick and choose any number of possibilities from those 50 combinations. Take a look at three of our more popular packages. 

“Cyber security is a process, not a product.” Kevin Cardwell, noted cyber security trainer, speaker and educator.

Three  New Options

1) Training Packages - CYRIN now offers several new pre-packaged training packages around topics such as: Essential Tools for Cybersecurity or Network Engineering, Forensics, Web Applications Security, Network Monitoring, or Secure Network Setup.
 
2) NICE framework - The NIST National Initiative for Cybersecurity Education (NICE) divides the cybersecurity field into 7 workforce categories and 33 specialty areas within those categories. Now CYRIN has mapped its labs, exercises and attack scenarios to these categories. This is important because the NICE framework provides a common language to talk about cyber roles and jobs in cybersecurity. Our easy to navigate new catalog index allows you to find the specific labs, exercises, and attack scenarios that interest you.

3) Pick 10 Labs - If you don’t see what you want with pre-packaged training or the NIST Framework, simply pick your own labs. Make your own package! Pick any 10 CYRIN labs, exercises, or attack scenarios from the CYRIN catalog and enjoy six months of access at a discounted, package price.

For Further Information and to request a Demo   >   CLICK HERE    <

 

 

 

 

 

 

 

 

 

« Cyber Threats & Nuclear Dangers
Standing On The Cryptocurrency Frontier »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Intercede

Intercede

Intercede is a cybersecurity company specializing in digital identities, derived credentials and access control, enabling digital trust in a mobile world.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

Meiya Pico Information Co

Meiya Pico Information Co

Meiya Pico is the leading digital forensics and information security products and service provider in China.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Mvine

Mvine

Mvine's primary business is authoring and selling Cyber-Secure Platforms for Collaboration Portals and for Identity Management as well as delivering cloud support services.

Aptiv

Aptiv

Aptiv is a global technology company that develops safer, greener and more connected solutions enabling the future of mobility.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

Anzen Technology Systems

Anzen Technology Systems

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty.

Redapt

Redapt

Redapt is an end-to-end technology solutions provider that brings clarity to a dynamic technical environment.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.