Cybersecurity Center of the Americas

Professional cybersecurity training for organizations and individuals

Graphic concept of cybersecurity, using icons of locks on a map to depict security

Is Your Team Ready For A Cyberattack? It’s Time To Find Out.

 Miami Dade College’s state-of-the-art Cyber Range is one of the most advanced security training platforms available anywhere. Designed by Cyberbit, a world leader in cybersecurity, the cutting-edge Cyber Range brings an IT security team face-to-face with live cyberattacks forcing them to detect, respond and remediate incidents in real-time.

What is the Cyber Range?

Similar to a flight simulator, our Cyber Range is a sophisticated virtual environment designed to train cybersecurity professionals in the most realistic way possible. Cyberattacks are unleashed within this virtual network forcing trainees to utilize multiple tools and techniques to mitigate the attack. No walking through a lab exercise here, it is either sink or swim. Know what to do and mitigate the attack or see your entire network come down while your sensitive information gets compromised.

Main features making Cyber Range a unique training tool

25+ Cyberattack Scenarios

Includes some of today’s most advanced attacks including Ransomware, SQL Injection, Man-in-the-Middle, DDoS and many others. New scenarios constantly added to ensure trainees face the latest generation of attacks.

Industry-leading Security Tools

Trainees use real security tools including firewalls, SIEMs, intrusion detection and prevention systems, packet analyzers, network monitoring systems, endpoint security and more to mitigate the attacks.

IP Network

Attacks occur within a fully functioning IP network that includes multiple segments, servers, databases, and operating systems.

Advanced Traffic Generator

Advanced Traffic Generator floods the network with routine traffic making it more challenging for teams to identify malicious actors and content while avoiding false positives.

Debriefing Capabilities

Once an attack is complete, trainees are able to review all the attack characteristics.

Seamless User Experience

Complex multi-layered attacks are unleashed with the push of a button allowing trainees to maximize their training sessions.

Cloud Platform

Similar to the real-world where IT teams are located throughout multiple locations, the Cyber Range can be accessed from anywhere allowing professionals to take part in the same training exercise no matter where they are based.