CYRIN - Where Education Comes to You

Featured Promotion

CYRIN - Where Education Comes to You - We’re Creating Some New Options 

CYRIN Cyber Range has something new - including a new catalog indexing system.

What does that mean for you? That means we have over 50 Labs, Exercises, Attacks and Courses. And our new indexing system allows you to pick and choose any number of possibilities from those 50 combinations. Take a look at three of our more popular packages. 

“Cyber security is a process, not a product.” Kevin Cardwell, noted cyber security trainer, speaker and educator.

Three  New Options

1) Training Packages - CYRIN now offers several new pre-packaged training packages around topics such as: Essential Tools for Cybersecurity or Network Engineering, Forensics, Web Applications Security, Network Monitoring, or Secure Network Setup.
 
2) NICE framework - The NIST National Initiative for Cybersecurity Education (NICE) divides the cybersecurity field into 7 workforce categories and 33 specialty areas within those categories. Now CYRIN has mapped its labs, exercises and attack scenarios to these categories. This is important because the NICE framework provides a common language to talk about cyber roles and jobs in cybersecurity. Our easy to navigate new catalog index allows you to find the specific labs, exercises, and attack scenarios that interest you.

3) Pick 10 Labs - If you don’t see what you want with pre-packaged training or the NIST Framework, simply pick your own labs. Make your own package! Pick any 10 CYRIN labs, exercises, or attack scenarios from the CYRIN catalog and enjoy six months of access at a discounted, package price.

For Further Information and to request a Demo   >   CLICK HERE    <

 

 

 

 

 

 

 

 

 

« Cyber Threats & Nuclear Dangers
Standing On The Cryptocurrency Frontier »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Advanced Resource Managers (ARM)

Advanced Resource Managers (ARM)

ARM provide specialist recruitment services for technology and engineering including cyber security.

Fasoo

Fasoo

Fasoo provides data-centric security to protect data within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities.

True Cybersecurity

True Cybersecurity

True Cybersecurity services include security audits, network and application security, managed security services and incident response.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

National Cyber Security Centre (NCSC) - Switzerland

National Cyber Security Centre (NCSC) - Switzerland

The National Cyber Security Centre is Swizerland's competence centre for cybersecurity and the first contact point for businesses, public administrations, and the public for cyber issues.

Gemserv

Gemserv

Gemserv is a specialist market design, governance and assurance services consultancy.

Aujas

Aujas

Aujas helps organizations manage information security risks by protecting data, software, people and identities in alignment with best practices and compliance requirements.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Assac Networks

Assac Networks

Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

MAXXeGUARD: The High Security Shredder. MAXXeGUARD easily destroys hard disks up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s etc.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

Technology Innovation Institute (TII)

Technology Innovation Institute (TII)

TII is a UAE-based research center that aims to lead global advances in AI, robotics, quantum computing, cryptography and secure communications and more.