RangeForce validates the training you've completed and the technical skills you've mastered on our platform. Whether you are just beginning your cybersecurity career or are mastering new skills needed to advance it, RangeForce sets you apart by demonstrating your ability to bring immediate value to security teams.
RangeForce Battle Paths relate to specific cybersecurity functions and are designed to equip you with the skills needed to thrive in professional environments.
There's no shortage of credentialing and certifications in the cybersecurity industry. Traditional training methods include classroom work, video-based learning, and online lectures, most of which culminate in a written exam far removed from the experience of real cybersecurity work.
Conventional training is ineffective, and cybersecurity professionals may still require years of training before mastering their jobs.
RangeForce take a different approach. With our Battle Paths, you'll experience hands-on training, job-related challenges, and a capstone exercise in our highly realistic, cloud-based cyber range.The skills learned are all real – featuring real IT infrastructure, using real security tools, and battling real cyberattacks.
Once you complete a Battle Path and collect your badge, you can easily promote your skills online and to your cybersecurity network – including hiring managers!
With RangeForce Badges, security leaders will know you can do the work that cybersecurity jobs demand.
SOC Analyst 1
The SOC Analyst 1 Battle Path enables cybersecurity professionals and students to gain live-environment experience with the foundational concepts and practices of a security operations center (SOC). Whether it’s understanding event logs, visualizing data, or conducting malware analysis, this curriculum is designed to get you SOC-ready. Work through a series of hands-on modules and related challenges to complete this path.
SOC Analyst 2
The SOC Analyst 2 Battle Path is a great resource for entry-level analysts looking to take their career to the next level. In this path, you’ll work through hands-on modules to develop robust skills, including more sophisticated search capabilities, utilizing APIs and SIEMs to automate repetitive tasks, and incorporating the right tools into incident response. During our course challenges, you’ll demonstrate the resilience you bring to teams by applying your skills to incident response.
The Threat Hunter Battle Path is our most advanced blue team training for those who have mastered enterprise security operations. In this path, we’ll introduce you to the practices and techniques employed by attackers, from the tools at their disposal to the way they view and target systems. Exercise your threat hunting skills in the cyber range through a variety of interactive challenges that are designed to give you a better understanding of targeted attacks. Before starting your Threat Hunter journey, it’s suggested that you first complete our SOC Analyst 1 and SOC Analyst 2 Battle Paths.
Web Application Security (OWASP)
The Web Application Security (OWASP) Battle Path is critical training for any application engineer mastering the skills needed to eliminate the most common application vulnerabilities. Supporting a "shift-left" development strategy, our training covers all ten of the OWASP vulnerabilities through hands-on, interactive training. By completing this training, you’ll demonstrate your ability to apply key web application security principles to real world uses.
Microsoft Core Security
The Microsoft Core Security Battle Path is designed to sharpen your skills in Microsoft products. If you’re just getting started for the first time, this Battle Path will introduce you to key aspects of managing and defending a Windows environment. Gain a working understanding of Active Directory and Group Policy, learn to analyze Windows event logs, and practice common security tasks you can use on the job. Apply your skills through relevant challenges, including how to investigate malware on a Windows computer.