CYRIN Enters A Strategic Alliance With Cyber Ireland

The CYRIN Cyber range training platform owner,  Architecture Technology Corporation (“ATCorp”) and Munster Technological University (MTU) have announced that they have entered a long-term strategic partnership to provide workforce development training for the Irish labour force.

Cyber Skills, funded by the Irish Higher Education Authority, is an alliance of academic partners which include Munster Technological University, Technological University Dublin, University of Limerick, University College Dublin, and the Commonwealth Cyber Initiative based in Virginia Tech in the US.

This brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland. ATCorp is a US based research and development firm located in Minneapolis, Minnesota. ATCorp is the developer of CYRIN which is a cloud based virtual cyber security training platform.

Cyber Skills addresses the critical cybersecurity skills shortage of professionals by providing innovative, creative and research informed courses.

Individuals can choose from specially designed pathways which will provide learners with the skill sets needed for a specific job role. Students can also build their own skill sets by choosing several different micro-credentials.

All classes are online, fully flexible and university accredited. By collaborating with academic institutions, learners using the CYRIN cyber range training platform, can keep ahead of cyber-criminals in a fast-changing technological environment.

Cyber Skills works closely with industry to gain insights into the needs of the cyber security workplace. This is to ensure that pathways and micro-credentials are designed in a way that targets up-skilling and re-skilling efficiently to produce workplace ready graduates.

Cyber Skills pathways and micro-credentials take enrolments twice a year and uses the CYRIN cyber range as a foundation for labs.  CYRIN provides three levels of training for Cyber Skills learners.

Level 1 of CYRIN offers ~45 skills development interactive labs. Many of these labs offer training on commonly used tools in network administration and defense.

Level 2 of CYRIN provides a number of individual and team cyber security exercises including Red Team/Blue Team exercises, Capture the Flag, Man in the middle and others.

Level 3 of CYRIN offers 8 cyber-attack scenarios on IT networks and industrial control system networks (ICS/SCADA). When a subscriber signs on to Level 3, an IT or ICS network appears on the screen. A few moments later the network is randomly attacked, and the student is to mitigate the attack and return the network to its pre-attack state.

Cyber Skills use CYRIN’s Exercise Builder application allowing each instructor to author his/her own training content on CYRIN. Exercise Builder also allows instructors to modify CYRIN instructional content to the specific needs of their classroom.

Finally, Exercise Builder allows each instructor to create cyber-attack simulations for students to practice “live fire” cyber defense.

Dr. Ken Thurber, President and CEO of ATCorp recently commented on the MTU-ATCorp alliance “We are pleased to work with Munster Technological University and the Cyber Ireland cluster members to use our technology to enhance and compliment Irish workforce skills when it come to one of today’s most pressing issues. That of, cyber security defense”.

“Cyber Skills cyber range will allow for the delivery and development of advanced cybersecurity skills for academic/work-based learners to hone their skills in a highly-realistic training environment.
“Our cyber range environment will also provide greater capacity for collaborative R&D industry focused projects on emerging research topics related to cybersecurity and digital," says Prof Donna O’Shea, Chair of Cyber Security at Munster Technological University.

For more information and to request a CYRIN Demo >  Click Here <

You Might Also Read: 

CYRIN Cyber Alert - Test-Drive The CYRIN Cyber Range:

 

« Digital Advertising Fraud Will Cost $68 Billion
Protect Your Organisation - Know Your Enemy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Tresorit

Tresorit

Tresorit helps teams to collaborate securely and easily by protecting their data with end-to-end encryption.

Canadian Centre for Cyber Security (CCCS)

Canadian Centre for Cyber Security (CCCS)

The Cyber Centre is the single unified source of expert advice, guidance, services and support on cyber security for government, critical infrastructure, the private sector and the public.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

Seculert

Seculert

The Seculert Attack Detection & Analytics Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

Austrian Institute of Technology (AIT)

Austrian Institute of Technology (AIT)

AIT is Austria's largest research and technology organisation and a specialist in the key infrastructure issues of the future including data science and cybersecurity.

Panorays

Panorays

Panorays automates third-party security lifecycle management. It is a SaaS-based platform, with no installation needed.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

ST Engineering Antycip

ST Engineering Antycip

ST Engineering Antycip (formerly Antycip Simulation) is Europe’s leading provider of professional grade COTS simulation software, projection & display systems, and related engineering services.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.