Cyber Range Hub
Wayne State University is your source for cybersecurity training and education.
With our new Cyber Range Hub at the Advanced Technology Education Center, experienced professionals who want to expand their knowledge or cybersecurity newcomers who need to master basic skills can get started with customized training through WSU's Office of Executive and Professional Development or in academic courses though the Department of Computer Science in the College of Engineering.
The Cyber Range Hub, part of the Michigan Cyber Range, provides certification courses, cybersecurity training exercises and product/software testing. It was created with financial support from the Southeast Michigan Defense Industry Adjustment Grant through the Office of Economic Adjustment, Department of Defense. Wayne State has partnered with Merit, the Advance Michigan Defense Collaborative and the Michigan Economic Development Corp. to create the hub.
Cybersecurity courses in the Department of Computer Science are offered in full semester and accelerated formats. Classes are held on the main campus and in the Cyber Range Hub at the Advanced Technology Education Center in Warren. Courses for academic credit apply to a bachelor's in computer science and include industry certifications. Students interested in learning more about the program and/or touring the building and new lab can meet with Colleen McKenney, academic advisor for computer science, for additional details. Call 313-577-2477 or email firstname.lastname@example.org for an appointment. Review current cybersecurity offerings at classschedule.wayne.edu.
Courses offered through Executive and Professional Development rotate throughout the year and can be delivered in custom formats based on the needs of your organization. Clients can test applications and systems in a totally secure environment called a "secure sandbox," which simulates a networked environment. Classes are offered at the Cyber Range Hub or at client locations/offices. Industry certifications are available through EPD.
A sampling of courses available in spring/summer 2017 are below. Prices vary; contact Michael Kelly,
313-577-6581, in EPD for more information.
Capture the Flag - noncredit
Free in spring/summer 2017 only!
This hands-on, instructor-led experiential Capture the Flag course allows students to learn the fundamentals of hacking tools, techniques and methodologies. Using open source tools, participants will fire off live attacks on networked systems in real time. Students can expect to learn and deploy these concepts:
• Linux/ KaliLinux tools • Kal command/ prompt • tool selection • password exploitation and storage • SQL vulnerabilities • scanning and enumeration • proxy chaining • traffic sniffing and manipulation
February 23, 2017 All seats are filled!
Ethical Computer Hacking – credit and noncredit
Learn to assess security risks; implement controls to secure network infrastructure; and combat hackers and viruses. This course introduces students to penetration testing and vulnerability assessments, and provides in-depth labs that focus on both open-source and commercial-based tools. Certification is awarded after completion of the course and successfully passing an online exam. Great training for network and site administrators, security professionals and auditors. Learn more by emailing email@example.com.
11:30 a.m. – 5 p.m. Fridays
March 10 – April 28, 2017
Digital and Network Forensics – credit and noncredit
Intensive lab exercises simulate investigation and recovery of data in networks; physical interception; traffic acquisition; attack detection; and protocol analysis. Typical participants include network and site administrators, security professionals and auditors. Learn more by emailing firstname.lastname@example.org.
10 a.m. – 3 p.m. Saturdays
March 11 – April 29, 2017
CISSO Bootcamp - noncredit
The five-day Certified Information Systems Security Officer course addresses the broad range of industry best practices covering the 19 critical modules to gain knowledge and skills expected of a security manager in any business. Participants learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring, and compliance in the full panorama of information systems management. Participants will be able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards.
9 a.m. – 5 p.m.
May 8 - 12, 2017
Associate Director, Executive and Professional Development
313-577-6581 / email@example.com
ATEC Manager, Educational Outreach
586-447-3905 / firstname.lastname@example.org