Cyber.org Range

Access This Resource

Empowering Educators to Teach Cyber

CYBER.ORG’s goal is to empower educators as they prepare the next generation to succeed in the cyber workforce of tomorrow.

Vision

To build a future where the nation’s cybersecurity needs are met by a knowledgeable, skilled, and passionate workforce.

Mission

To ensure that every K-12 student gains foundational and technical cybersecurity knowledge and skills.

Approach

Empower educators and caregivers with resources and training needed to deliver cyber content to students.

We at HPA are happy to provide access to CYBER.org for all enrolled families with a MS365 account. If you do not yet have a MS365 account please click the link here to request one. After you’ve received and set up your MS365 account, you may use your MS365 school email address to apply for a CYBER.org Range (educator) account.

What is a Cyber Range?

A cloud-based environment capable of running virtual machines with access to the internet, but closed off from any private networks. By launching these machines in a web browser, no additional hardware or software is necessary to practice cybersecurity concepts.

What can you do with the Range?

Teachers will be able to lead their students through labs and allow them to experience cyber attacks in a safe and controlled, virtual environment. All labs in the CYBER.ORG Cybersecurity course can be completed on the CYBER.ORG Range.

Practice Attacking and Defending

Students are able to get hands-on practice using real-world tools with common cyber attacks and learn how to defend against them.

Practice for Security+ Exam

The labs in CYBER.ORG’s Cybersecurity Course are designed to prepare students for the CompTIA Security+ Exam.

The Security+ Exam establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills required to:

  • Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT
  • Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
  • Identify, analyze, and respond to security events and incidents