0 +
CYBERSECURITY JOB OPENINGS GLOBALLY
0 +
TOTAL CYBERSECURITY JOB OPENINGS IN US
$
CYBER SECURITY MEDIAN SALARY
virtualized corporate network

The UTSA Cyber Range Platform

Real-World Network.
Real-World Security Tools.
Real-World Simulated Attacks.

Real-World Experience that your employer can count on when it matters most.

Learn the skills you need in the UTSA Cyber Range, a virtualized corporate network with over 60 components including application, database and email servers as well as workstations and simulated internet segment.  The virtual SOC (Security Operations Center) features market-leading security products so that you develop expertise with the same tools you will use on the job.

The University of Texas at San Antonio is the place to be for hands-on and practical cybersecurity education and training.

The College of Business has been offering cybersecurity classes since 2001. Our programs are led by world-class researchers and academics, as well as adjuncts who work in security and understand the needs of industry

Upcoming Classes

Experience hands-on training in real-time using examples of real-life scenarios that run in a live virtual environment. These courses are designed to train IT professionals, such as developers, administrators or ERP personnel. During the course, participants will be required to monitor, investigate and mitigate security incidents, using UTSA's Cyber Range pre-defined scenarios.

SOC Analyst Training –
Cyber Range Course

This course includes live simulated attacks inside the UTSA Cyber Range and will cover both the technical and operational aspects of incident investigation. On the technical side, participants will learn tools and techniques used to investigate the network and will practice using these tools on the virtual environment. On the operational side, participants will learn about working as a team, dividing the tasks of monitoring and investigating between the different team members, drawing conclusions from the gathered information and applying mitigation processes.

After completing this course, you should be able to:

  • Understand basics of what is cyber and information security and get familiar with the cyber world and its basic terms.
  • Understand basics of Windows domain environment.
  • Understand the TCP/IP model and network / application protocols.
  • Understand basics related to SQL and understand relational databases.
  • Understand rule base of firewalls and SIEM.

$2,400 USD

CyberCon SCADA HMI –
Vulnerability Exploit Training

Your plant is under attack! The attacker enters the SCADA network by exploiting an outdated web server that is installed on a computer on the SCADA network. The attack cripples the plant completely, using Modbus Force packets to toggle the plant machines such as turbines and centrifuges on and off.

Experience hands-on training in real-time using examples of real-life scenarios that run in a live virtual environment. This course is designed to train IT professionals. During the course, participants will be required to monitor, investigate and mitigate security incidents around an in-house SCADA System.

$1,500 USD

Man-in-the-Middle Attack

Your network is the target of a Man-in-the-Middle (MiTM) attack. The attacker deceives hosts by impersonating a legitimate proxy in the segment.

Experience hands-on training in real-time using examples of real-life scenarios that run in a live virtual environment. These courses are designed to train IT professionals, such as developers, administrators or ERP personnel. During the course, participants will be required to monitor, investigate and mitigate security incidents, using UTSA’s Cyber Range pre-defined scenarios

$400 USD

Trojan Privilege Escalation Attack

An unsuspecting user executes a Trojan horse, but is executed with user privileges and thus is limited. But the Trojan is able to escalate its privileges, and create a new administrative account. Using the new account, the Trojan breaks into the database server and uses it as a gateway to upload secret files to the organization’s website and causes a major public data leak.

Experience hands-on training in real-time using examples of real-life scenarios that run in a live virtual environment. These courses are designed to train IT professionals, such as developers, administrators or ERP personnel. During the course, participants will be required to monitor, investigate and mitigate security incidents, using UTSA’s Cyber Range pre-defined scenarios

$400 USD

Router SIEM Attack

An attacker uses a brute force attack to gain access to the public router. Upon successful login, the attacker modifies the router configuration to redirect users to a malicious payload. When the payload is executed, a remote session is established with the attack machine, leading to much more damage.

Experience hands-on training in real-time using examples of real-life scenarios that run in a live virtual environment. These courses are designed to train IT professionals, such as developers, administrators or ERP personnel. During the course, participants will be required to monitor, investigate and mitigate security incidents, using UTSA’s Cyber Range pre-defined scenarios

$400 USD

Ransomware Phishing Attack

After an unsuspecting user opens a document in a phishing email, the files on the system are encrypted a ransom is demanded to receive the decryption key. You will detect, analyze, and respond to the attack. During the exercise, you will also investigate the CNC server and use the information revealed to solve the case.

Experience hands-on training in real-time using examples of real-life scenarios that run in a live virtual environment. These courses are designed to train IT professionals, such as developers, administrators or ERP personnel. During the course, participants will be required to monitor, investigate and mitigate security incidents, using UTSA’s Cyber Range pre-defined scenarios

$400 USD

After successful completion of the program, your verified digital certificate will be emailed to you in the name you used when registering for the program.  All certificate images are for illustrative purposes only and may be subject to change at the discretion of The University of  Texas at San Antonio. 

Note:  Online certificate programs do not grant academic credit or a degree from The University of Texas at San Antonio.

Certificate

Upon successful completion of each program, The University of Texas at San Antonio grants a verified digital certificate of completion to participants that can be used as continuing education credits and reinforces hands-on experience in the most hyper-realistic cybersecurity training platform in the United States.  

CONTACT

Are you ready to embrace or expand your career in Cybersecurity?

+1 (210)729 6460

Or write to us: [email protected]

OUR COURSES

Schedule Enrollment Consultation

  • This field is for validation purposes and should be left unchanged.

The University of Texas at Sant Antonio is collaborating with cyber security education provider CRS to offer a porfolio of high-impact online and in person cybersecurity training and degree programs.  By working with CRS, we are able to broaden access beyond traditional on-campus degree programs to serve professional development and traditional education opportunities in cybersecurity education.

Schedule Enrollment