single circuit shape

Range Platform

The U.S. Cyber Range platform has two primary components. The Exercise Area provides infrastructure for hands-on cybersecurity education and the Courseware Repository provides teaching materials to support high school and college faculty.

single circuit shape

Exercise Area

The U.S. Cyber Range hosts isolated virtual networks where students can practice what they learn in immersive, hands-on laboratory exercises to complement their cybersecurity courses. 

Students interact with virtual desktops of cloud-hosted virtual machines directly in a tab on their HTML5-compliant browser. No special hardware, software, or browser plugins are required; students just need a web browser and a connection to the internet. 

The U.S. Cyber Range creates instances of our cyber range infrastructure for customer organizations. With administrative access to their own instance of our cyber range, schools are able to create accounts for educators within their organization. Educators can then create courses, enroll students, and provision virtual infrastructure without relying on our team to deploy student VMs for them. The exercise area is white-labeled, so schools can brand the exercise area with their own school logo. 

Our cyber range infrastructure provides significant resource savings. It replaces the need for schools to purchase hardware and software and employ personnel to install, operate, secure, and maintain those systems. The cloud-based infrastructure allows us to meet increasing resource demands and provide efficiencies that an on-premises computer lab cannot. 

Fast and Scalable

Our cloud-based approach allows fast deployment and scalability. We can meet increasing resource demands and provide efficiencies that an on-premises computer lab cannot.

Available Anywhere

Students interact with virtual desktops of cloud-hosted virtual machines directly in a tab on their HTML5-compliant browser. No special hardware, software, or browser plugins are required; students just need a web browser and a connection to the internet.

Cost Effective

Our cyber range infrastructure provides significant resource savings. It replaces the need for schools to purchase hardware and software and employ personnel to install, operate, secure, and maintain those systems.

Brand Customization

The exercise area is white-labeled, so schools can brand the exercise area with their own school or organization logo.

Variety of Network Scenarios

A variety of different virtual environments are available for deployment, representing various network topologies and virtual devices such as Windows and Linux virtual machines. A Capture-the-Flag (CTF) platform is included in the catalog of deployable exercise environments and can be used by educators to provide a competitive, gamified environment for cyber education.

Accessible

We want our platform to be usable by all students. We strive to make the U.S. Cyber Range compliant with Web Accessibility Compliance Guidelines (WCAG), version 2.1. Please contact us for a copy of our most recent Voluntary Product Accessibility Template (VPAT).

Persistent and Non-Persistent

Instructors have the option of adding a “persistent” or “non-persistent” environment feature while provisioning environments. Persistent environments retain changes and data across sessions, while non-persistent environments reset to their original state after each session.

You are In Control

The U.S. Cyber Range creates instances of our cyber range infrastructure for customer organizations. With administrative access to their own cyber range, schools are able to create accounts for educators within their organization. Educators can then create courses, enroll students, and provision virtual infrastructure without relying on our team to deploy infrastructure.

Safe

With our platform, your IT team doesn’t have to worry about what students are doing. They are not on the school network, they are in our network, in the cloud. Our exercise environments are isolated from each other, and from the internet. Students cannot “hack” or otherwise interfere with internet systems from their virtual environments. Their world-wide web access is carefully controlled using a proxy to prevent them from getting to unsafe or inappropriate websites.

Anonymous Credentials

We offer organizations the option to generate anonymous credentials for users in their courses. This allows instructors to maintain the anonymity of their students while using our platform. This is particularly helpful for organizations that must adhere to student data requirements.

Courseware Repository

The U.S. Cyber Range provides courseware to support educators at the high school and college level, with content covering a wide range of cybersecurity-related topics. Our extensive courseware repository includes syllabi, lesson plans, presentation slides, lab exercises, homeworks, exams, and answer keys.

Modular

Content is divided into modules, each containing a few lessons. Educators can easily incorporate content into existing courses, or create an entire course from modules they select.

Open

Our courseware is shared using a Creative Commons license (CC BY-NC) that allows users to remix, adapt, and build upon it non-commercially, as long as it is attributed to the source (the U.S. Cyber Range).

Editable

All of our content is provided as Microsoft Word or Powerpoint documents that educators can modify to suit their student population.

High Quality

Our courseware is developed by experienced educators at the university, college, and high school levels in collaboration with our expert content coordinators. 

Consistent

Formats are consistent across lessons, courses, and modules and are designed to be easily modified to match other courseware used by high school and college educators.

Sample Content

The U.S. Cyber Range hosts isolated virtual networks where students can practice what they learn in immersive, hands-on laboratory exercises to complement their cybersecurity courses.

Password Audit Lab

This laboratory exercise gives students hands-on experience with password strength analysis using command-line tools in Linux.

Download Sample Lab

SQL Injection Lab

This laboratory exercise provides students with hands-on experience with a web application exploit known as SQL injection. SQL injection takes advantage of web application flaws that might let a user maliciously expose, and even manipulate, a web application’s back-end database.

Download Sample Lab

Intro to Wireshark

Students are introduced to Wireshark, a widely-used network packet analyzer. In this exercise, students will analyze packet capture files, and also learn how to capture live network traffic in real-time.

Download Sample Lab