Cyber Range Hub
Wayne State University is your source for cybersecurity training and education.
The Cyber Range Hub, part of the Michigan Cyber Range, provides certification courses, cybersecurity training exercises and product/software testing. Wayne State is partnering with the Merit Network, the Advance Michigan Defense Collaborative and the Michigan Economic Development Corp. to offer unique programming and services at the hub.
University students/academic credit
Cybersecurity courses in the Department of Computer Science are offered in full semester and accelerated formats. Classes are held on the main campus in Midtown Detroit and in the Cyber Range Hub and apply to a bachelor's in computer science and include industry certifications. Students interested in learning more about the program should contact Colleen McKenney, academic advisor, at 313-577-2477 or firstname.lastname@example.org.
Check classschedule.wayne.edu to access the course schedule and find out when the next courses are offered.
To register, students must apply and be admitted to Wayne State.
Courses are offered through Executive and Professional Development (EPD), the university's training and consulting program. These courses rotate throughout the year and can be delivered in custom formats based on the needs of any organization. Prices vary, so those who are interested should contact Michael Kelly, director of EPD, at 313-577-6581 for more information.
Courses are listed below and are offered online or at Wayne State's Advanced Technology Education Center, 14601 E. 12 Mile Road, Warren MI 48088. Please inquire for upcoming courses.
Certified Information Systems Security Professional (CISSP)
Ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles. Participants must have a minimum of five years of cumulative paid work experience in two or more of the eight domains of the CISSP CBK. The course ensures credibility and success within the information systems security field and assists in taking steps to prepare for the CISSP Certification requirements.
This course is for people looking to enter the cyber security field or learn common hacking techniques to better defend networks. Participants should have basic system administration, basic exposure to Linux and basic computer knowledge. This course is ideal for security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of a networked data infrastructure.
Security + CompTIA
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix, or Linux; and who wants to further a career in IT by acquiring a foundational knowledge of security topics. This course is ideal for network engineers, support technicians, telecoms support engineers, network designers, network administrators or IT managers.
Introduction to Applied Cyber Security – C) ISSP
Certified Information Systems Security Professional (also available for academic credit in CSC 5991 / CRN 18970).
Ethical Computer Hacking – C) PEH
Certified Professional Ethical Hacker (also available for academic credit in CSC 5991 / CRN 18969).
Network Penetration Testing – C) PTE
Certified Penetration Testing Engineer (also available for academic credit in CSC 5991 / CRN 18971).
This course is for people looking to enter into the cyber security field or learn common network topology to better defend assets from cyber threats. This includes entry-level or novice practitioners who are seeking a better understanding of data traversing a network and the monitoring tools available. Participants will learn the fundamental skills required to defend networks against most computer hacking attempts.
Security on a Shoestring
Participants will learn how to implement cost-effective solutions within their organization. Ideal for small- or medium-sized businesses, this course will help organizations with slim budgets maximize their resources and increase the protection of their IT environments and data.
Certified Ethical Hacking
Security officers and IT professionals, auditors and site administrators will learn about the latest malware attacks, the latest hacking tools and emerging attack vectors in cyberspace. The course includes hacking challenges and is built in compliance to the NICE 2.0 Framework to ensure a systematic job role mapping. Participants should have experience with Windows and Unix/Linux, operating systems and TCP/IP, and at least two years of job experience in the field of network security.
Threat on your Doorstep
This course is for executives, emergency managers, FEMA coordinators, professionals and non-technical staff with the need to learn or explain the current cyber security threat landscape. The course is an in-depth analysis that helps to ensure organizations are prepared to address cyber incidents and threats.
Capture the Flag
Through the use of open source exploits, network defenders and Red Teamers will better understand the vulnerabilities in networks by participating in this unique course. Participants will gain hands-on, real-world experience in a safe environment, but should have a baseline of security knowledge and familiarity of security concepts. Participants will traverse through challenges to find flags and input them into a gaming system. This is a self-paced progression through systems as they exist in the real world and represents a means to assess individual skills across a broad range of systems and challenges.
This course is an in-depth planning workshop that requires mature organizations to bring a copy of their current IR plan. During the workshop, participants will review and rebuild an incident response plan that meets annual testing requirements. The course is ideal for cyber practitioners and compliance officers who are involved with the plan.
Certified Security Principles
This course prepares participants for security across the entire environment including understanding risk management, identify and access control, and network and data security. This course will help participants understand the principal security knowledge needed to keep IP and IT infrastructure safe. IT professionals, server administrators, network administrators, virtualization and cloud administrators, and anyone that needs a general understanding of security should take this course.
The cyber range hub can also be used to test applications and systems in a totally secure environment called a "secure sandbox," which simulates a networked environment. This resource is ideal for companies that lack a secure testing environment or for joint ventures that need an objective space for testing. Fees vary depending on the capacity requirements and testing schedule. Contact Michael Kelly, director of EPD, at 313-577-6581 for more information.