Cybersecurity Essentials Battle Path
Course Overview
Effective training is critical to any security professional’s success. With RangeForce’s Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Objectives
This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce Badge to validate and promote your achievements.
Target Audience
Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.
Estimated Course Length: 24 hours
Module 1
- Introduction to Cybersecurity/ Terminology
- History of Cybersecurity
- ICybersecurity Teams
Module 2
- Understanding the Threat Landscape
- Firewall Overview
- IDS/IPS Overview
Module 3
- Endpoint Protection Platforms Overview
- Endpoint Detection and Response
- Server Protection Overview
Module 4
- Logging Overview
- Windows Event Logs
- Linux Syslog
Module 5
- Introduction to the SOC
- Blue Team Function and Tasks
- Red Team Function and Tasks
Module 6
- Understanding the Cyber Kill Chain
- Introduction to SIEM and SOAR
- Security Topology
Module 7
- Known vs. Unknown Malware
- Ransomware Overview
- CVE Overview
Module 8
- Introduction to OSI Networking Model
- Layer 2 Networking
- Layer 3 Networking
- Layer 4 Networking
Module 9
- Deploying Enterprise Endpoint Protection
- Deploying Enterprise Server Protection
- DevOps Security Overview
Module 10
- Physical Security Considerations
- Introduction to Governance, Risk, and Compliance
- Cybersecurity Essentials Challenge (Capstone)
Course Overview
Effective training is critical to any security professional’s success. With RangeForce’s Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Objectives
This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce Badge to validate and promote your achievements.
Target Audience
Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.
Estimated Course Length: 24 hours
Module 1
- Introduction to Cybersecurity/ Terminology
- History of Cybersecurity
- ICybersecurity Teams
Module 2
- Understanding the Threat Landscape
- Firewall Overview
- IDS/IPS Overview
Module 3
- Endpoint Protection Platforms Overview
- Endpoint Detection and Response
- Server Protection Overview
Module 4
- Logging Overview
- Windows Event Logs
- Linux Syslog
Module 5
- Introduction to the SOC
- Blue Team Function and Tasks
- Red Team Function and Tasks
Module 6
- Understanding the Cyber Kill Chain
- Introduction to SIEM and SOAR
- Security Topology
Module 7
- Known vs. Unknown Malware
- Ransomware Overview
- CVE Overview
Module 8
- Introduction to OSI Networking Model
- Layer 2 Networking
- Layer 3 Networking
- Layer 4 Networking
Module 9
- Deploying Enterprise Endpoint Protection
- Deploying Enterprise Server Protection
- DevOps Security Overview
Module 10
- Physical Security Considerations
- Introduction to Governance, Risk, and Compliance
- Cybersecurity Essentials Challenge (Capstone)