Curriculum

  • 1, 3, 5 & 10 Day Sessions
  • Training onsite at Purdue's cyber range
  • Remote training options
  • Customize duration, curriculum, and delivery modality
  • Recognized industry tools and applications

Range Scenarios

  • Web Service Shutdown
  • Trojan Data Leakage
  • Web Defacement
  • SQL Injection
  • DB Dump/FTP Exploit
  • Java NMS Shutdown
  • Java Sendmail
  • Permission Escalation
  • Killer Trojan
  • WMI Worm
  • Ransomware
  • DDOS SYN Flood
  • DDOS DNS Amplification
  • WPAD M-I-M

Intended Audience

  • Cyber professionals ready to become cyber warriors
  • Technical professionals with skills adjacent to cyber-security
  • Cyber for the boardroom - Executives with vested interest in cyber fundamentals

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2015 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Office of Corporate and Global Partnerships

Trouble with this page? Disability-related accessibility issue? Please contact Office of Corporate and Global Partnerships at ocgp@purdue.edu.