Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

RangeForce Introduces Role Based Self-Directed Training for Top Cyber Security Positions

  • Battle Path Programs Provide Affordable 10 Course Interactive Packages to Achieve Industry Recognized SOC Certifications

RangeForce, the company that is revolutionizing cybersecurity training, announced eight Battle Path training programs that enable individuals to acquire skills for entry level cyber security positions or advance their career. Each multi-module Battle Path combines interactive training exercises using actual IT infrastructure, security tools and cyberattack scenarios on the cloud-delivered RangeForce Battle Skills platform.

Related Posts
1 of 20,021

“The most effective way to acquire cyber security skills is by ‘doing’ through hands-on training, simulations and interactive exercises”

Battle Paths are available for the eight most in-demand cyber security positions: SOC Analyst 1, SOC Analyst 2, Threat Hunter, Web Application Security (OWASP), Microsoft Core Security with Secure Coding, and Cloud Security. Upon successful completion of a Battle Path program, each participant receives an industry recognized RangeForce Badge that validates for hiring managers that they have mastered the real-world skills and are qualified for the position.

Recommended AI News: Accounts Payable Departments Lag in AI Automation, New Ephesoft Survey Finds

“The most effective way to acquire cyber security skills is by ‘doing’ through hands-on training, simulations and interactive exercises,” said Gerald Auger, Ph.D, Managing Partner of Coastal Information Security Group and Adjunct Professor at the Citadel. “RangeForce Battle Paths combine a real-world environment complete with security tools, malware and a virtual assistant for self-guided learning. Furthermore, the content is organized to provide tailored training to learn the skills related to the respective role. It’s the closest thing you can get to on the job training.”

Each Battle Path program provides job-related challenges and a capstone exercise in a cloud-based cyber range that includes:

  • Software and network emulation with leading security tools from Splunk, Recorded Future, Carbon Black and more
  • Interactive, hands-on training
  • Virtual teaching assistant
  • Learner goals and objectives tracking
  • Achievement-based badging

“With Battle Paths, learners get a teacher, tutor and real enterprise network to practice and perfect the skills they need to get their first cyber security job or advance their career,” said Jeff Orloff, Vice President of Product at RangeForce. “It’s affordable, remote, at your own pace learning that results in a RangeForce Badge, which is industry recognized by employers.”


Eight Job Specific Battle Paths

The RangeForce platform provides a comprehensive cyber security learning journey for beginners all the way up to seasoned enterprise analysts. The addition of Battle Paths to the Battle Skills platform makes learning prescriptive, actionable, and fun. Combined with the RangeForce Battle Fortress cyber range environment, RangeForce provides the most comprehensive cyber skills training platform on the market today.

Battle Paths are available for the following positions:

SOC Analyst 1

Provides live-environment experience with the foundational concepts and practices of a security operations center (SOC). Whether it’s understanding event logs, visualizing data, or conducting malware analysis, this curriculum is designed to get you SOC-ready. Work through a series of hands-on modules and related challenges to complete this path.

SOC Analyst 2

For entry-level analysts looking to take their career to the next level. In this path, learners work through hands-on modules to develop robust skills, including more sophisticated search capabilities, utilizing APIs and SIEMs to automate repetitive tasks, and incorporating the right tools into incident response. During our course challenges, learners develop incident response skills.

Threat Hunter

Advanced blue team training for those who have mastered enterprise security operations. In this path, learners will be introduced to the practices and techniques employed by attackers, from the tools at their disposal to the way they view and target systems. Exercises include threat hunting skills in the cyber range through a variety of interactive challenges that are designed to provide a better understanding of targeted attacks. SOC Analyst 1 and SOC Analyst 2 Battle Paths are a recommended prerequisite.

Web Application Security

For application engineers that want to master the skills needed to eliminate application vulnerabilities. Supporting a “shift-left” development strategy, this Battle Path covers all ten of the OWASP vulnerabilities through hands-on, interactive training.

Microsoft Core Security

This Battle Path introduces key concepts for managing and defending a Windows environment. It provides a working understanding of Active Directory and Group Policy, how to analyze Windows event logs, familiarity performing common security tasks and how to investigate malware on a Windows computer.

Secure Coding

The Secure Coding Battle Path provides a hands-on approach for addressing security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, including how to identify and remediate them in your own projects. This Battle Path is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile.

Cloud Security

Helps learners understand how to best protect resources that live in the cloud. This Battle Path covers attack techniques such as lateral movement and cryptomining, and how to defend against them, as well as data protection, identity and access management, and vendor specific security strategies.

Cybersecurity Essentials

The Cybersecurity Essentials Battle Path emphasizes the foundational components of security. Develop a clear understanding of key concepts and practices without diving into too much complexity. This path also covers topics across your security program, including business continuity and networking. Cybersecurity Essentials is a great starting point for aspiring cybersecurity professionals or those looking to expand their capabilities within a small or medium-sized organization.

Leave A Reply

Your email address will not be published.