There's no shortage of credentialing and certifications in the cybersecurity industry. Traditional training methods include classroom work, video-based learning, and online lectures, most of which culminate in a written exam far removed from the experience of real cybersecurity work.
Conventional training is ineffective, and cybersecurity professionals may still require years of training before mastering their jobs.
RangeForce take a different approach. With our Battle Paths, you'll experience hands-on training, job-related challenges, and a capstone exercise in our highly realistic, cloud-based cyber range.The skills learned are all real – featuring real IT infrastructure, using real security tools, and battling real cyberattacks.
Once you complete a Battle Path and collect your badge, you can easily promote your skills online and to your cybersecurity network – including hiring managers!
With RangeForce Badges, security leaders will know you can do the work that cybersecurity jobs demand.
The SOC Analyst 1 Battle Path enables cybersecurity professionals and students to gain live-environment experience with the foundational concepts and practices of a security operations center (SOC). Whether it’s understanding event logs, visualizing data, or conducting malware analysis, this curriculum is designed to get you SOC-ready. Work through a series of hands-on modules and related challenges to complete this path.
The SOC Analyst 2 Battle Path is a great resource for entry-level analysts looking to take their career to the next level. In this path, you’ll work through hands-on modules to develop robust skills, including more sophisticated search capabilities, utilizing APIs and SIEMs to automate repetitive tasks, and incorporating the right tools into incident response. During our course challenges, you’ll demonstrate the resilience you bring to teams by applying your skills to incident response.
The Threat Hunter Battle Path is our most advanced blue team training for those who have mastered enterprise security operations. In this path, we’ll introduce you to the practices and techniques employed by attackers, from the tools at their disposal to the way they view and target systems. Exercise your threat hunting skills in the cyber range through a variety of interactive challenges that are designed to give you a better understanding of targeted attacks. Before starting your Threat Hunter journey, it’s suggested that you first complete our SOC Analyst 1 and SOC Analyst 2 Battle Paths.
The Web Application Security (OWASP) Battle Path is critical training for any application engineer mastering the skills needed to eliminate the most common application vulnerabilities. Supporting a "shift-left" development strategy, our training covers all ten of the OWASP vulnerabilities through hands-on, interactive training. By completing this training, you’ll demonstrate your ability to apply key web application security principles to real world uses.
The Microsoft Core Security Battle Path is designed to sharpen your skills in Microsoft products. If you’re just getting started for the first time, this Battle Path will introduce you to key aspects of managing and defending a Windows environment. Gain a working understanding of Active Directory and Group Policy, learn to analyze Windows event logs, and practice common security tasks you can use on the job. Apply your skills through relevant challenges, including how to investigate malware on a Windows computer.
The Cybersecurity Essentials Battle Path emphasizes foundational components of security. Develop a straightforward understanding of key concepts and practices without diving into too much complexity. This path also covers topics across your security program, including business continuity and networking. Cybersecurity Essentials is a great starting point for aspiring cybersecurity professionals or those looking to expand their capabilities within a small or medium-sized organization.
The Cloud Security Battle Path prepares you to protect resources in the cloud. With the rapid expansion of public cloud environments and continued migration of applications and data, cloud security has never been more important. While third-party point solutions are easy to deploy, they present unique security challenges relating to their own configuration. Complete this Battle Path to better understand critical cloud security concepts, including the key technologies and features of public cloud environments.
The Secure Coding Battle Path provides a hands-on approach for addressing security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, including how to identify and remediate them in your own projects. This Battle Path is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile. Secure Coding learners will improve their ability to deliver software that is secure and private.