EDEN PRAIRIE, Minn., August 16, 2023 (Newswire.com) - CYRIN and the Rochester Institute of Technology (RIT) have created a Level 2 Exercise that resides on CYRIN's virtual cybersecurity training platform. In this exercise, called "Configure an Enterprise Network," students must configure the firewalls and routers in accordance with the security policies of the organization. The firewalls and routers must be configured to implement policies related to how traffic to and from the internet and between different subnets is handled.
CYRIN has three levels of training - Labs, Exercises and Attacks - on its virtual, cloud-based platform. Level 2 Exercises are robust training exercises that challenge the student to work in a virtual environment to demonstrate proficiency with different scenarios with multiple cybersecurity tools that enhance training and mimic real-world scenarios. In this exercise, which looks at an enterprise network, students use pfSense, an open-source firewall and router used by thousands of enterprises and officially supported by Netgate. Students must be familiar with the pfSense console and web interfaces. Those unfamiliar with pfSense are encouraged to complete the CYRIN "Firewall Configuration with pfSense" lab before attempting this exercise.
This exercise was developed in conjunction with the Rochester Institute of Technology and their Global Cyber Institute. RIT used CYRIN's patented Exercise Builder tool to create several labs that CYRIN has licensed for use on the CYRIN platform. This exercise is also mapped to NIST NICE Specialty Areas or NIST NICE Work Roles listed below.
- Cyber Defense Infrastructure Support Specialist (PR-INF-001)
- Enterprise Architect (SP-ARC-001)
- Security Architect (SP-ARC-002)
- System Administrator (OM-ADM-001)
- Information Systems Security Manager (OV-MGT-001)
- Network Operations Specialist (OM-NET-001)
CYRIN is designed for the seasoned cybersecurity professional or the student new to the field. Inexpensive and tailored for a 24/7 schedule, CYRIN labs, exercises and attack scenarios allow for training in a virtual cloud-based environment 365 days a year. CYRIN is also an excellent way for entrepreneurs, small businesses, and others to test their software products. Nearly any operating system that runs on the Intel/AMD x86 or x86_64 architecture can be uploaded to CYRIN as an OVA file or installed directly within CYRIN using the Exercise Builder. To learn more about our labs and content, visit the CYRIN catalog page.
ATC-NY, based in Ithaca, NY, is the Cybersecurity division of Architecture Technology Corporation, and is responsible for CYRIN development. They work with numerous commercial, educational and government agencies, including the Department of Defense, who helped support the effort to develop CYRIN.
About Architecture Technology Corporation
Architecture Technology Corporation (ATCorp) is headquartered in Eden Prairie, MN. ATCorp specializes in advanced research and software-intensive solutions for complex problems in Information Security, Cybersecurity, Enterprise-Scale Network Computing, AI, and Machine Learning. To read more about their products and services, visit ATCorp at https://www.atcorp.com.Contact Information:
Marketing Director, CYRIN
Original Source: CYRIN and the Rochester Institute of Technology (RIT) Create a Level 2 Exercise for a Virtual Cybersecurity Training Environment
ROAD TOWN, Virgin Islands (British), August 3, 2023 (Newswire.com) - PureSquare continues to raise the bar of holistic online security and privacy solutions worldwide. PureKeep, PureEncrypt, and PurePrivacy are a case in point in this regard, while PureVPN remains steadfast in enhancing its services.
Today, PureSquare proudly announces the successful completion of the fourth consecutive assessment of PureVPN's stringent no-log policy by a top audit firm. The recent technical evaluation was performed on VPN servers, configurations, and their supporting infrastructure across various locations. The evaluation period spanned from the middle of February to the end of April 2023.
Uzair Gadit, co-founder and CEO of PureSquare, emphasized the importance of user trust by stating, "Gaining the trust of our users is of utmost importance to us. We understand that when individuals choose a VPN service, they rely on us to protect their online privacy and ensure their data remains confidential."
In a digital landscape where user data privacy is key, PureVPN is leading the way. Its no-log policy is assessed by independent third-party assessments, which assures our users no identifiable data is kept that could be later disclosed to third parties. These thorough audits are not commonplace in the VPN industry, further emphasizing our unwavering commitment to upholding the integrity of our no-log assertions.
After the audit, we received the Technical Privacy Assessment Report, which confirms:
- PureVPN does not log your origin IP address.
- PureVPN does not log your assigned VPN IP address.
- PureVPN does not log the specific time when you connect to our VPN server.
- PureVPN does not log your activities after you've connected to our VPN server.
What does it mean for PureVPN users?
- With PureVPN's no-log policy, you can browse the internet with peace of mind, knowing that your personal information is protected from third parties, ISPs, and advertisers.
- By not storing your logs, PureVPN reinforces online security and preserves anonymity. In the event of a data breach, there is no sensitive information to compromise.
With cyber threats constantly evolving, at PureVPN, we're committed to empowering you to explore the digital world fearlessly, while ensuring your anonymity is always maintained.
For more information on PureVPN's no-log assessment, please visit here.
PureVPN is a premium VPN service provider that has been empowering millions of users globally with top-tier online privacy and security solutions. With its no-log policy and commitment to user trust, PureVPN stands as a symbol of excellence in the VPN industry.Contact Information:
Original Source: PureVPN's No-Logs Policy Verified by a Top Auditor for the Fourth Time, Strengthening Commitment to User Privacy