Skip to main content
CYRIN
  • Lab Categories
    Secure Network Setup Secure System Setup Network Monitoring and Recon Vulnerability Scanning Secure Web Application Setup Web Application Security Analysis Incident Response Cyber Forensics Attack, Defense, and Incident Response Scenarios Industrial Control System / SCADA Scenarios
  • Explore by Industry
    Education Solutions Utilities Solutions
  • Resources
  • FAQ
  • Blog
  • You are not logged in. (Log in)
Real Attacks. Real Tools. Real Scenarios.
CYRIN Cyber Range

Welcome to the CYRIN Cyber Range

CYRIN® is a next-generation cyber-range where you use real tools, real attacks, and real scenarios to hone your skills in a virtual environment. Secure a Linux server system, analyze the security of a web application, or respond to a denial of service attack in a controlled environment. Practice on your own schedule from within your web browser—no custom software or travel necessary!


Everything cyber range in 2 minutes.

Explore CYRIN solutions by industry

Education

Remote Learning for
Educators and Students

Learn More

Utilities

Advanced Cyber Training
for the Utility Industry

Learn More

Sign-up, sign-in, take a test drive

Browse our categories below, then sign up for a lab to learn by doing with CYRIN.

Sign Up

If you already have an account, log in to access your cyber exercises.

Log In

Looking to try out CYRIN Training®? Our Web Application Security Analysis with OWASP-ZAP lab is available FREE for 30 days. No credit card required!

Try It Free
CYRIN Cyber Range

Current Labs, Exercises, and Attack Scenarios

Incident Response

You’ve been hacked, or you only suspect you’ve been hacked. Now what?

Network Monitoring and Recon

Once your network is set up securely, you must continue to be vigilant.

Vulnerability Scanning

As an IT administrator, it’s important to be aware of the tools potential adversaries are likely to use against your networks and your applications.

Web Application Security

Web-based applications are the most significant security exposure your organization faces.

Secure Network Setup

Setting up your network securely is the first step in preventing attacks and misuse of your resources.

Cyber Forensics

You’ve been attacked. Now where do you go from here?

Secure System Setup

Defense-in-depth requires individual network hosts to be set up securely, whether they be individual workstations, server systems, or cloud computing nodes.

Secure Web Application Setup

Securely configuring web server software and frameworks is the foundation of creating secure web-based services.

Industrial Control Systems/SCADA

Gain insight that addresses trends, challenges, and best practices for defending Industrial Control Systems and SCADA networks.

Attack, Defense, and Incident Response Scenarios

Test your abilities with virtual capture-the-flag, defacement, forensics, and denial of service scenarios.

CYRIN Cyber Range

Contact Us for a Demo, Pricing, or More Information

Call the CYRIN Sales Team at +1-800-850-2170, e-mail sales@cyrintraining.com, or use the form below.

Home
Moodle logo

Architecture Technology Corporation

  https://www.atcorp.com

  cyrin@atcorp.com

You are not logged in. (Log in)

  • Lab Categories
    • Secure Network Setup
    • Secure System Setup
    • Network Monitoring and Recon
    • Vulnerability Scanning
    • Secure Web Application Setup
    • Web Application Security Analysis
    • Incident Response
    • Cyber Forensics
    • Attack, Defense, and Incident Response Scenarios
    • Industrial Control System / SCADA Scenarios
  • Explore by Industry
    • Education Solutions
    • Utilities Solutions
  • Resources
  • FAQ
  • Blog

Download on the App Store

Get it on Google Play

Data retention summary
Get the mobile app

Copyright © 2020 Architecture Technology Corporation · All rights reserved · Site Policies and Privacy Policy
CYRIN technology is protected by U.S. Patents 9,076,342, 9,384,677, 10,068,493, 10,083,624, and others pending.