Search by property

Jump to navigation Jump to search

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Has description" with value " # Expand upon an existing NSF CICI grant at GW to extend regional access to the Michigan Cyber Range over CAAREN (100 Gbps DWDM network interconnected with Internet2) and develop enhanced real-world training environments using an advanced software defined multi-service exchange (MSX) technology. # Establish a city-wide cyber representation of the IT infrastructure, underlying operational work flows, utilities management, emergency services and administrative operations as a platform for cybersecurity training in offensive and defensive tactics. # Provide customizable courses and training practicum that can be configured to mimic the systems being tested by teams of cybersecurity engineers and their non-technical managers. ". Since there have been only a few results, also nearby values are displayed.

Showing below up to 2 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

    • CyberCity Education Platform  + ( # Expand upon an existing NSF CICI grant </br># Expand upon an existing NSF CICI grant at GW to extend regional access to the Michigan Cyber Range over CAAREN (100 Gbps DWDM network interconnected with Internet2) and develop enhanced real-world training environments using an advanced software defined multi-service exchange (MSX) technology.</br># Establish a city-wide cyber representation of the IT infrastructure, underlying operational work flows, utilities management, emergency services and administrative operations as a platform for cybersecurity training in offensive and defensive tactics.</br># Provide customizable courses and training practicum that can be configured to mimic the systems being tested by teams of cybersecurity engineers and their non-technical managers.</br>engineers and their non-technical managers. )