Training Materials

​​​The main goal of every round of competition is to improve the security of one or more virtual machine images. In the past, teams have been tasked with:

  • Maintaining and hardening ​critical services​​
  • Fixing vulnerabilities
  • Removing malware from the systems
  • Answering forensics questions
More cybersecurity elements are added as teams advance to later rounds of competition. In previous seasons, teams have been given networking challenges, such as:​​

  • Virtual network configuration​
  • Subnetting and IP addressing

In the past, CyberPatriot has used these images during the online rounds:

  • Windows XP, Windows Vista, Windows 7, Windows 8, and Windows 8.1 workstation​
  • Windows Server 2000, Windows Server 2003, and Windows Server 2008
  • Ubuntu 12.04
Teams do not need to have any of these specific operating systems installed directly on their computers. Rather, these images are played using VMware Player software. More information on the technical requirements for using this free software can be found on the Technical Specifications​​ page.

For help playing a virtual machine image and starting a round, please view this instructional video​.

The training pages in the menu to the right are intended to provide teams with basic cybersecurity knowledge​. However, it is not an exhaustive list and may be insufficient for the more challenging rounds of competition. After reviewing these materials, teams should delve deeper into each of the presented topics and look to their Coaches and Mentors for further training. If you have a link that you think would be helpful for training​, please send us an email at​​. ​​ ​