
By Our Community
Look for Cyber Range Development. We meet twice a month on Tuesday or Thursday from 7-8.
You’ll have a chance to learn:
- Ansible
- Ansilbe Tower
- Automation Methods
- Docker Container Technology
- Red Hat Virtualization
- Red Hat Satellite
- Various CTF Frameworks
Bring your willing attitude, a little of your time and we’ll supply the rest. We thank you for joining us and hope to see you at our next meeting.
For Our Community
Did You Know?
Cyber range training provides a safe environment for personnel to:
- Recognize patterns for security threats and compromise
- Recognize threats faster and practice responding to them properly
- Simulate critical infrastructure components, including computer server and clients, without touching the production environment.
- Conduct offensive operations against simulated enemy targets
- Conduct defensive operations to protect simulated critical infrastructure components
Setting up a cyber security training event is an excellent way for IT personnel to get the training they need.
By Our Community
Look for Cyber Range Development. We meet twice a month on Tuesday or Thursday from 7-8.
Come join us as we develop the ISSA Cyber Range for community use. If you have an interest in learning new technologies we’ll help you get started. Learn Sytems Administration and DevOps methods. All skill sets are needed. We can give you hands on experience and chance to try new things. WARNING: MAY CAUSE LEARNING AND FUN!!!
You’ll have a chance to learn:
- Ansible
- Ansilbe Tower
- Automation Methods
- Docker Container Technology
- Red Hat Virtualization
- Red Hat Satellite
- Various CTF Frameworks
Bring your willing attitude, a little of your time and we’ll supply the rest. We thank you for joining us and hope to see you at our next meeting.
For Our Community
Did You Know?
Cyber range training provides a safe environment for personnel to:
- Recognize patterns for security threats and compromise
- Recognize threats faster and practice responding to them properly
- Simulate critical infrastructure components, including computer server and clients, without touching the production environment.
- Conduct offensive operations against simulated enemy targets
- Conduct defensive operations to protect simulated critical infrastructure components
Setting up a cyber security training event is an excellent way for IT personnel to get the training they need.
Our Sponsors
Job Listing
Text CTA
Centered
Text Area
Split
ImageContent: Left
Headings overlayed on media: No
Media size: contain
Background: cream

Intro Text
Center Aligned, no icon
Content with Background
Variation: Accented Header

-
Job Listings Accordion
Lorem, ipsum dolor sit amet consectetur adipisicing elit. Cumque rerum autem optio voluptate magnam culpa atque cum saepe voluptatum, ex similique vel eligendi expedita unde! Maxime reprehenderit laboriosam ipsa harum. Lorem ipsum dolor sit amet consectetur adipisicing elit. Non, doloribus fugit rem voluptatem illo est porro harum, magni corporis eligendi facilis ut laboriosam, incidunt quos quidem soluta ratione omnis perferendis.
-
Job Listing 2
Lorem, ipsum dolor sit amet consectetur adipisicing elit. Cumque rerum autem optio voluptate magnam culpa atque cum saepe voluptatum, ex similique vel eligendi expedita unde! Maxime reprehenderit laboriosam ipsa harum.Lorem ipsum dolor sit amet consectetur adipisicing elit. Non, doloribus fugit rem voluptatem illo est porro harum, magni corporis eligendi facilis ut laboriosam, incidunt quos quidem soluta ratione omnis perferendis.