Column Control DTX

Keysight Cyber Training Simulator, CY101KCTS

Datenblätter

Introduction

 

Demand for industry-ready cyber warriors is intense. There’s no shortage of bad actors in cyberspace. But there is a serious shortage of trained professionals to counter them. Businesses, government agencies, education institutions, and other critical organizations have openings they’re anxious to fill—immediately. An academic program that produces professionals who can step quickly into their roles would attract top students and forge strong relationships with the foremost hiring institutions. 

 

Keysight Cyber Training Simulator is a complete, turnkey cyber range designed to prepare students for employers’ real challenges daily. The cyber range has a critical difference: our educational solution is based on Keysight BreakingPoint, the gold standard application and security traffic generator used by our global enterprise and government agency customers. 

 

With a full range of hands-on red and blue team exercises based on the Cyber Kill Chain model, students hone their defense strategies on customizable, realistic scenarios that are continuously updated by Keysight’s Global Application and Threat Intelligence Team (ATI)—the same team that keeps our professional customers one step ahead of the bad guys.

 

Key Features

 

Keysight Cyber Training Simulator enables students to develop and sharpen their skills in the same realistic environment and with the same market-leading tools used by professionals in government and defense, banking and finance, and other enterprises where the fine jobs are.

 

BreakingPoint

 

Keysight Cyber Training Simulator is backed by BreakingPoint. BreakingPoint is a traffic generator software that is widely used by enterprises and governments worldwide. It scans for the latest cyber threat, saves it, and simulates it in Keysight Cyber Training Simulator. This ensures Keysight Cyber Training Simulator is always updated with the latest cyber threats and immerses the users in the same environment they will find in the real world because they come from the real world. BreakingPoint is constantly upkeep by Keysight Global Application & Threat Intelligence Team (ATI).

 

Lab scheduling

 

Empower students, lecturers, and lab admins to a self-service schedule and conveniently book lab sessions and lab resources. The built-in lab scheduler ensures that lab schedules are always up-to-date and prevent scheduling conflicts.

 

Integrate Learning Management System (LMS)

 

With the built-in Learning Tool Interoperability (LTI) feature, you can easily plug and play the whole Keysight Cyber Training Simulator solution into your LMS. Ensuring educational technology tools are IMS Global certified is the best way to establish a plug-and-play ecosystem. Students can navigate seamlessly from LMS to the Cyber Academy Module without having to log in separately. Lecturers can also design the teaching curriculum to include remote lab capability. 

 

Go to https://www.keysight.com/my/en/product/PW9112EDU/pathwave-lab-operation-remote-learning.html to find out more about Keysight PathWave Lab Operations for Remote Learning as an IMS Global certified LTI learning tool.

×

Please have a salesperson contact me.

*Indicates required field

Select a preferred method of communication*Required Field
Preferred method of communication? Change email?
Preferred method of communication?

By continuing, you are providing Keysight with your personal data. See the Keysight Privacy Statement Informationen darüber, wie wir diese Daten verwenden.

Thank you

A sales representative will contact you soon.

Column Control DTX