Intermediate Offering Level



Why choose Intermediate? Basic is designed for users who have already received a cybersecurity training and are familiar with basic cybersecurity threats and best practices. With basic, you will learn about Context estabilishment, Cyber-risk assessment and Cybersecurity and risk awareness. It is also the first offering level that allows you to try existing Cyber Range training scenarios composed by up to 10 elements (Virtual Machines/Virtual Networks). At the end of the courses, you will receive a Diploma that certifies the successful completion of the offering level and you will also automatically be included in the Cybersecurity professional register (CyPR).


Who is it for?

cybersecurity training students


Institutions of Higher Education and Research Centres 



cybersecurity training Large Enterprises


Large Enterprises 



cybersecurity training Public Sector


Public Sector Organisations



Intermediate Course Decription


Course title Learning goals

Describe target of analysis, level 1  

Learn how to describe the scope and focus of the target system under analysis based on a given context and how to document the target of analysis.

Identify and describe security assets, level 1 

Learn to analyse the target description to identify and document asset-relevant information that are to be considered in the cyber-risk assessment.

Identify and describe threat profiles and high-level risks, level 1 

Learn a structured approach to organize risk-related information based on the target description and the basic constructs of the risk modelling language CORAS.

Identify risks, level 1 

Learn the basic usage of the CORAS modelling language to identify and document cyber-risks.

Awareness of Password Weakness with hands-on training 

Learn hands-on training in demonstrating how weak passwords are exploited.



What are you going to learn?


  • Understand how to use the UML class diagram as a basis to create a target infrastructure to simulate on the Cyber Range.
  • Create likelihood scales, consequences scales, and risk evaluation matrices, and understand how these scales are used in
  • Analyse risk models and identify risk indicators, configure to obtain indicator values, and use Cyber-risk models for training and evaluation in Cybersecurity scenarios on the platform.
  • Explain how risk treatments may be identified using CORAS modelling language, associate risk treatments on vulnerabilities, threat scenarios, and unwanted incidents, and analyse a risk model and create appropriate risk treatments.



What they say about us

It is important to learn about Cybersecurity best practices and how you can develop them in a controlled environment. Cyber ranges can help put these to practical use. - Francisco, University of Pisa Student