What can a Business expect from this program?
Your students will graduate with a degree in Cybersecurity and confidence in the knowledge that the first time they handle a Cyber Attack will not be on the job. Their hands-on cyber range experience as students makes their resume stand out as information security professionals. Their remarkable job performance will enhance enrollment and prestige for your institution.
Graduating students will not only have a certification in Cybersecurity but also have experienced a real-world attack, making their resume stand out. More importantly, the first time they witness a cyber attack will not be on the job. In return, students being more prepared on the job leads to higher enrollment and prestige for your school.
The best collaborative and interactive platform for your students:
Ottawa University’s Cyber Range chat platform empowers collaboration among participants and allows for greater instructor- trainee communications. This collaborative platform encourages students to share insights, screenshots and messages among themselves and their instructor. The platform can be used to add comments, mention students and open a new channel for each topic.
The Virtualized SOC is a collection of commercial best of breed tools for Detection and Prevention of Cyber Attacks, it also includes the end trainees’ workstations that connect to those tools and can connect to elements of the attacked network.
The tool set depends on the network being used for a specific scenario, but typically includes at least one tool from several categories below:
- Firewalls from Palo Alto, CheckPoint
- Endpoint Security from McAfee, Symantec and Cyberbit
- SIEM from MicroFocus Arcsight, IBM Qradar
- OT Security
- IT Availability tools
Ottawa University Cyber Range (OUCR) training offers various segments, which simulate operational environments.
The main network segments are:
- Simulated internet zone (simulates popular web services such as webmail, websites, and others…)
- Security segments
- DMZ segments
- Domain controller
- Several subnets with servers, databases, end user stations
- VPN segment
In addition to IP-based networks, the training network can integrate sections of SCADA networks, such as physical MODBUS controllers and other SCADA components, to simulate complex networks of critical infrastructure sites.
Standard network security tools, such as firewalls, routers, Network Management Systems (NMS), anti-virus, SIEM, and others, are incorporated into the network, thereby simulating a real-world cyber environment.