Cyber Range Training
Improve your team’s ability to respond to threats
Many security teams recognize their employees need to be trained on how to identify and respond to threats, but the real challenge is finding the specific training and tools that will work best with their unique environment. Most vendor-provided training focuses on the vendor’s proprietary technology, which neglects the fundamental technology-agnostic concepts your team needs to enhance their ability to respond. The CTIR Cyber Range Training provides your team with an immersive experience that is designed and delivered by incident response experts so your security professionals can increase their competency in incident response-related tasks.
Build your skills with Cyber Range Training
The CTIR Cyber Range Training is a comprehensive, virtual, three-day exercise that uses a crawl-walk-run method. Your team starts by examining various tools and techniques that they then apply to a real-world scenario. By immersing your team in this simulated scenario, you ensure they learn the necessary skills and techniques they need to better combat cyber threats and improve team cooperation, all while improving your organization’s security.
What does this include?
-
Exposure to real-world threat tactics, techniques and procedures
(TTPs) - conducted against real targets, providing your team with an authentic experience. -
Improved team readiness and capabilities to respond to threats
with advanced incident response practices that are vendor- and tool-agnostic and focus on methodology and techniques. -
Stronger team cohesion and improved technical and soft skills
that enhance your security team’s ability to work together to solve complex incident investigations.
Cyber Range Training timeline
-
Day 1 - Email phishing
- Methodology
- Initial Access
- Escalation
-
Day 2 - Intrusion detection
- WebShell
- Persistence
- Exfiltration
-
Day 3 - Capstone course
- Real-world intrusion analysis
-
Tools & methodologies learned
- Email Analysis
- Cisco Secure Malware Analytics
- Open-source Tools (e.g. OSQuery, Volatility)
- DFIR Investigative Techniques from Talos IR experts
Interested in this service?
Reach out to your account team or contact us below.