industry news
Subscribe Now

Keysight Cyber Training Simulator Provides Universities a Realistic Turnkey Cyber Range

Keysight's turnkey cyber range closes the cybersecurity workforce gap

SANTA ROSA, Calif. July 14, 2022

Keysight Technologies, Inc. (NYSE: KEYS), a leading technology company that delivers advanced design and validation solutions to help accelerate innovation to connect and secure the world, has introduced Keysight Cyber Training Simulator (KCTS), a comprehensive, turnkey cyber range that simulates real-world traffic using the company’s BreakingPoint solution.

With cybercrime on the rise and cybersecurity professionals difficult to find, organizations are at risk. Consequently, cybersecurity jobs are growing by more than 30% annually (as sited in (ISC) 2, 2021) and students who are well prepared will be the first to be considered for the industry’s top jobs. Therefore, academic programs that prepare them will be in high demand.

Keysight Cyber Training Simulator enables students to develop their skills in a realistic environment with market-leading tools currently used by professionals in enterprises and governments worldwide. As a result, students can quickly fill the roles in cybersecurity across many industries.

“Educators are making cybersecurity training a high priority to address the urgent need for cybersecurity professionals across all industries,” said Boon Juan Tan, vice president and general manager of General Electronics Measurement Solutions at Keysight Technologies. “Partnering with Keysight enables universities to develop the next generation of leading experts and stay at the forefront of the ever-changing cybersecurity landscape.”

KCTS is designed to help academic institutions fill the cyber industry workforce gap with industry-ready graduates. KCTS breaks from the common, script-based cyber range approach to provide a realistic and rounded experience, with unique benefits for both faculty and students, including:

  • The ability to hone their skills in real-world scenarios: Students will learn in the same environment they will use on the job post-graduation. For example, Keysight’s BreakingPoint simulates real-world attacks using legitimate traffic, distributed denial-of-service (DDoS) and malware, enabling students to learn from actual scenarios, not scripts. These scenarios are regularly updated by Keysight’s professional teams, ensuring students are trained on the latest threats.
  • The ability to quickly think on their feet: A full range of Red Team and Blue Team lab exercises, based on one or more of the simplified Cyber Kill Chain stages, prepares students for the unexpected and everchanging environment in the cyberworld.
  • Easy integration into the school’s Learning Management System (LMS): A common frustration for faculty is when third-party teaching tools have limited or no integration with the university’s LMS. KCTS features full Learning Tools Interoperability (LTI) to ensure that instructors can take full advantage of their university’s LMS investment.
  • Easy customization: The instructor has full ownership and control to create and customize scenarios as needed for the syllabus.

Additional information about Keysight Cyber Training Simulator can be found here.

About Keysight Technologies   

Keysight delivers advanced design and validation solutions that help accelerate innovation to connect and secure the world. Keysight’s dedication to speed and precision extends to software-driven insights and analytics that bring tomorrow’s technology products to market faster across the development lifecycle, in design simulation, prototype validation, automated software testing, manufacturing analysis, and network performance optimization and visibility in enterprise, service provider and cloud environments. Our customers span the worldwide communications and industrial ecosystems, aerospace and defense, automotive, energy, semiconductor and general electronics markets. Keysight generated revenues of $4.9B in fiscal year 2021. For more information about Keysight Technologies (NYSE: KEYS), visit us at www.keysight.com.

Leave a Reply

featured blogs
Apr 19, 2024
In today's rapidly evolving digital landscape, staying at the cutting edge is crucial to success. For MaxLinear, bridging the gap between firmware and hardware development has been pivotal. All of the company's products solve critical communication and high-frequency analysis...
Apr 18, 2024
Are you ready for a revolution in robotic technology (as opposed to a robotic revolution, of course)?...
Apr 18, 2024
See how Cisco accelerates library characterization and chip design with our cloud EDA tools, scaling access to SoC validation solutions and compute services.The post Cisco Accelerates Project Schedule by 66% Using Synopsys Cloud appeared first on Chip Design....

featured video

How MediaTek Optimizes SI Design with Cadence Optimality Explorer and Clarity 3D Solver

Sponsored by Cadence Design Systems

In the era of 5G/6G communication, signal integrity (SI) design considerations are important in high-speed interface design. MediaTek’s design process usually relies on human intuition, but with Cadence’s Optimality Intelligent System Explorer and Clarity 3D Solver, they’ve increased design productivity by 75X. The Optimality Explorer’s AI technology not only improves productivity, but also provides helpful insights and answers.

Learn how MediaTek uses Cadence tools in SI design

featured chalk talk

Secure Authentication ICs for Disposable and Accessory Ecosystems
Sponsored by Mouser Electronics and Microchip
Secure authentication for disposable and accessory ecosystems is a critical element for many embedded systems today. In this episode of Chalk Talk, Amelia Dalton and Xavier Bignalet from Microchip discuss the benefits of Microchip’s Trust Platform design suite and how it can provide the security you need for your next embedded design. They investigate the value of symmetric authentication and asymmetric authentication and the roles that parasitic power and package size play in these kinds of designs.
Jul 21, 2023
31,416 views