(주)코어시큐리티 :::Global Security Contents Leader:::
Phone: 02-3453-6630 Email: coresec@coresec.co.kr

CORE CYBER RANGE (CCR)

Core Cyber Range

CCR

Scenario-based virtual incident response training

Core Cyber Range (CCR) is a virtual incident response training system that simulates a real-world internet network. Trainees can learn practical cyber security technologies and techniques in various ways such as scenario-based training, CCR War-game, and etc..

Cost and time effective security training

Now you don't have to spend time for constructing your virtual training environment. CCR provide customized virtual training environments with convenient interfaces.

Various scenario-based investigation training in the simulation lab

Let's learn practical incident response techniques naturally with the real-world cyber attacks in the lab.

ACCR War-Game

For effective investigation in the scenario-based training and CCR War-game, CCR has security training bootcamp.

Various scenario-based investigation training in the simulation lab

Red team (offensive), blue team (defensive), and white team(managing) play the CCR War-Game which is real-time cyber attack and defense game. During the game, your techniques will unconsciously improve.

Receiving help from our training professionals

When you are having trouble during training, our technical instructors will help you immediately


TRUSTED PARTNER

One of the fastest growing security companies

- Average annual growth rate is 95%!
- 2017 growth rate will be 101%.

Customized training program

- Several training options for organizations with multiple staffs to be trained in short time and for a lower cost.

Certified security training program

Government certified IT security training company. Years of partnership with Korean Military, Financial Security Institute, Hyundai, Samsung, National Police, and Government Agencies.

Various courses including latest technologies

We have courses covering not only well-known subjects such as digital forensics, incident response, web/network hacking, and malware analysis but also unique topic such as imbedded device hacking, ICS/SCADA, and cyber threat hunting.