CyberFox Train
Cyber Operations
Cyber Operations NICE Specialty Area Package Mastering Cyber Operations with Cyrin’s NICE Specialty Area Package. Performs activities to gather evidence on criminal or foreign intelligence...
Exploitation Analysis 2
Exploitation Analysis 2 NICE Specialty Area Package Analyzes collected information to identify vulnerabilities and potential for exploitation. This package consists of CYRIN labs focusing on...
Exploitation Analysis 1
Exploitation Analysis 1 NICE Specialty Area Package Analyzes collected information to identify vulnerabilities and potential for exploitation. This package consists of CYRIN labs focusing on...
Red Teaming Professional (RTP)
Cyberfox Red Teaming Professional (CT-RTP) Master the art of simulated adversarial attacks and fortify your organization with Cyberfox Train’s Red Teaming Training Course. Course Description:...
Attack and Defense
Attack and Defense Package A cyberattack is right around the corner—does your team know what it will look like or how to respond? Test your...
Secure Web Application Setup
Secure Web Application Setup Package Securely configuring web server software and frameworks is the foundation of creating secure web-based services. Labs in this category explore...
Vulnerability Scanning
Vulnerability Scanning Package Secure Your Website Before Hackers Do: Use Cyrin Vulnerability Scanning Package! As an IT administrator, it’s important to be aware of the...
Secure System Setup
Secure System Setup Package Defense-in-depth requires individual network hosts to be set up securely, whether they be individual workstations, server systems, or cloud computing nodes....
ICS Scenarios
ICS Scenarios Package Industrial Control Systems are the backbone of manufacturing plants, utilities, and critical infrastructure world-wide. Are your ICS security personnel prepared for cyberattack?...
IT and DevOps
IT and DevOps Package Learn the basics of system setup, configuration, and administration. Or, if you’re a developer, learn how to migrate to DevOps. Labs...
Web Application Security Analysis
Web Application Security Analysis Package Web-based applications are the most significant security exposure your organization faces. Labs in this category focus on detecting and understanding...
Network Monitoring and Reconnaissance
Network Monitoring and Reconnaissance Once your network is set up securely, you must continue to be vigilant. Whether it be an innocent user’s risky behavior...