Cyber Range Hub
Wayne State University is your source for cybersecurity training and education.
With our new Cyber Range Hub at the Advanced Technology Education Center, experienced professionals who want to expand their knowledge or cybersecurity newcomers who need to master basic skills can get started with customized training through WSU's Office of Executive and Professional Development or in academic courses though the Department of Computer Science in the College of Engineering.
The Cyber Range Hub, part of the Michigan Cyber Range, provides certification courses, cybersecurity training exercises and product/software testing. It was created with financial support from the Southeast Michigan Defense Industry Adjustment Grant through the Office of Economic Adjustment, Department of Defense. Wayne State has partnered with Merit, the Advance Michigan Defense Collaborative and the Michigan Economic Development Corp. to create the hub.
Cybersecurity courses in the Department of Computer Science are offered in full semester and accelerated formats. Classes are held on the main campus and in the Cyber Range Hub at the Advanced Technology Education Center in Warren. Courses for academic credit apply to a bachelor's in computer science and include industry certifications. Students interested in learning more about the program and/or touring the building and new lab can meet with Colleen McKenney, academic advisor for computer science, for additional details. Call 313-577-2477 or email firstname.lastname@example.org for an appointment. Review current cybersecurity offerings at classschedule.wayne.edu.
Courses offered through Executive and Professional Development rotate throughout the year and can be delivered in custom formats based on the needs of your organization. Clients can test applications and systems in a totally secure environment called a "secure sandbox," which simulates a networked environment. Classes are offered at the Cyber Range Hub or at client locations/offices. Industry certifications are available through EPD.
A sampling of courses available in spring/summer 2017 are below. Prices vary; contact Michael Kelly,
313-577-6581, in EPD for more information.
Capture the Flag - noncredit
Free in spring/summer 2017 only!
Capture the Flag is a fun learning tool developed by carving out core servers and network infrastructure from Alphaville, a virtual training environment. Participants traverse through challenges in Alphaville to find flags and input them into the scoring system. Individual participants use penetration testing and forensic skills to gather clues and collect evidence. A self-paced exercise, CTF is a means to assess individual skills across a broad range of systems and challenges.
CTF can be played as individuals or small groups, to pursue threads of artifacts in a timed, scored environment.
CTF is divided into nine independent tracks. Each thread is built around a specific security skills set, such as web, SQL or password security. Recovering artifacts gets harder as players progress along the thread, providing an active, adaptable challenge. Capture the Flag is an excellent approach to learn highly technical concepts in a fun, non-traditional environment.
Who should participate?
Anyone who wants to know what it's like to be a hacker and learn something new and exciting while having fun should take part. This course can benefit people of all skill levels -- it can be a fun one-day event and engaging learning tool for young IT professionals, but there also are challenges for the seasoned hacker or senior security administrator.
Skills helpful to excel in CTF
· Linux command line knowledge
· Windows and Linux service exploitation
· Port scanning, networking scanning, vulnerability scanning
· SQL injection
· PHP code exploitation
· PII discovery
· Privilege escalation
· Brute force
· Password hash cracking
· Forensics and reverse engineering
This is an independent exercise, but an onsite facilitator can answer any questions that arise from participants.
Internet access is not available on any of the CTF computer stations.
Participants are encouraged to bring a laptop to do separate online searches, if necessary.
February 23, 2017 May 25
Ethical Computer Hacking – credit and noncredit
Learn to assess security risks; implement controls to secure network infrastructure; and combat hackers and viruses. This course introduces students to penetration testing and vulnerability assessments, and provides in-depth labs that focus on both open-source and commercial-based tools. Certification is awarded after completion of the course and successfully passing an online exam. Great training for network and site administrators, security professionals and auditors. Learn more by emailing email@example.com.
11:30 a.m. – 5 p.m. Fridays
March 10 – April 28, 2017
Digital and Network Forensics – credit and noncredit
Intensive lab exercises simulate investigation and recovery of data in networks; physical interception; traffic acquisition; attack detection; and protocol analysis. Typical participants include network and site administrators, security professionals and auditors. Learn more by emailing firstname.lastname@example.org.
10 a.m. – 3 p.m. Saturdays
March 11 – April 29, 2017
CISSO Bootcamp - noncredit
The five-day Certified Information Systems Security Officer course addresses the broad range of industry best practices covering the 19 critical modules to gain knowledge and skills expected of a security manager in any business. Participants learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring, and compliance in the full panorama of information systems management. Participants will be able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards.
9 a.m. – 5 p.m.
May 8 - 12, 2017
Associate Director, Executive and Professional Development
313-577-6581 / email@example.com
ATEC Manager, Educational Outreach
586-447-3905 / firstname.lastname@example.org