Skip to content

FAQ for Higher Education Institutions

What is the primary purpose of the Heartland Cyber Range, and how does it align with our institution's educational goals?

The primary purpose of the Heartland Cyber Range is to provide a cutting-edge and adaptable environment for comprehensive cybersecurity education, training, and research.

Many cybersecurity teams often encounter various types of cyber threats, such as ransomware attacks, cloud breaches, or supply chain vulnerabilities, without prior exposure. However, by leveraging the comprehensive library of real-world learning modules and exercises, students can gain hands-on experience in a wide array of real-world scenarios.

The Heartland Cyber Range empowers students to enter the workforce with a distinct advantage, enabling them to meet their employers' demands effectively.

What types of exercises and scenarios are available for students and faculty to practice on?

Scenarios mimic real-world situations and put students in various roles to practice in during cyberattack simulations such as ransomware attacks and active breaches. Exercises promote exploration around a certain topic or tool and allow the student the freedom to complete a task in whatever way they choose. Both scenarios and exercises are built to allow the student to put into practice what they’ve learned in the classroom and while on the range.

Can the cyber range accommodate various skill levels, from beginners to advanced learners?

Yes, there are different levels of difficulty settings for the exercises within the Heartland Cyber Range to accommodate students of varying skill levels. We understand that cybersecurity education should be inclusive and adaptable to the experience and expertise of each student. Therefore, the range offers exercises and challenges in a tiered fashion, allowing students to choose their appropriate difficulty level.

How is the cyber range maintained and kept up to date with the latest threats and technologies?

We have a team to curate content and ensure it is relevant and current to today’s cybersecurity landscape.

What are the technical requirements and infrastructure needed to support the cyber range on our campus?

To access the Heartland Cyber Range, students will need the following:

  • Internet Connection: The Heartland Cyber Range is browser-based, so a stable internet connection is essential. We recommend a broadband or high-speed connection to ensure a seamless experience.

  • Web Browser: Any modern web browser will work. Popular choices like Google Chrome, Mozilla Firefox, Microsoft Edge, or Safari are all compatible. Please ensure your browser is up to date for the best performance and security.

  • Computer or Device: Students can use a desktop computer, laptop, or tablet, if it supports a compatible web browser. While a larger screen and full-sized keyboard are preferable for the best experience, the cyber range is designed to be responsive and usable on various devices.

  • Operating System: The Heartland Cyber Range is platform-agnostic. It can be accessed from Windows, macOS or Linux operating systems.

Is the Heartland Cyber Range cloud-based or on-premises, and what are the implications for our network and IT infrastructure?

The Heartland Cyber Range is hosted on a horizontally distributed edge-based network across Kansas and Western Missouri, and the only requirement from the school network is access to the platform via internet connectivity. The Heartland Cyber Range does not interfere with the institution’s existing network setup.

Can students access the Heartland Cyber Range remotely or is it restricted to on-campus use?

The Heartland Cyber Range can be utilized anywhere with an internet connection, providing both in-class and self-paced opportunities for students to practice outside of the classroom. As it provides a simulated environment for hands on experience, it can be used to practice any skills and knowledge gained from traditional curriculum.

What support and training resources are available to faculty who want to use the Heartland Cyber Range in their courses?

Support and technical assistance are readily available for both teachers and students encountering difficulties while using the Heartland Cyber Range. We understand that effective support is crucial to a successful learning experience.

Can the Heartland Cyber Range be customized to fit our institution's specific needs and curriculum?

Yes, Phase II of the Heartland Cyber Range will allow faculty to create customized content that is relevant to what students are learning in the textbook. Faculty can create custom labs, scenarios, or exercises with the drag-and-drop functionality to complement their existing curriculum.

Faculty will also create custom learning pathways for students by selecting available content in the HCR library and sequencing the preferred pathway. This provides faculty with the ability to create a customized learning experience that many other cyber ranges don’t offer.

What kind of technical support and troubleshooting resources are available for students and faculty using the Heartland Cyber Range?

There are several ways to get support:

The Heartland Cyber Range environment presents numerous opportunities for ongoing research and development. Our platform is designed to be a versatile and adaptable sandbox environment, making it an ideal setting for exploring cutting-edge research initiatives.

Faculty and students interested in getting involved in research can leverage the Heartland Cyber Range in the following ways:

  • Adaptable Research Environment: The Heartland Cyber Range provides a secure and flexible environment where researchers can simulate real-world cyber threats and scenarios. This adaptability allows for the development and testing of new cybersecurity strategies, technologies, and tools.

  • Custom Research Inquiries: We encourage faculty and students to contact us with specific research inquiries and project proposals. Whether you are exploring innovative techniques for threat detection, vulnerability analysis, or any other cybersecurity-related research, our team can assist in customizing the platform to meet your research needs.

  • Collaboration Opportunities: The Heartland Cyber Range is committed to fostering collaboration between academic institutions and industry. We welcome partnerships with faculty and students to jointly address research challenges, share insights, and develop solutions to emerging threats.

  • Educational Integration: Researchers can also explore opportunities for integrating their findings and innovations into educational programs, ensuring that the next generation of cybersecurity professionals benefit from the latest research outcomes.