Completed Labs and Obtained Badges
RangeForce offers hands-on cybersecurity training that builds skills and knowledge in defensive security. If you're interested in SOC work, threat hunting, and SIEM, RangeForce provides a practical platform to develop and refine these skills. I have completed more than 400 labs on RangeForce and I am ranked among the top 10 learners.
Senior SOC Analyst
This advanced course builds on SOC 1 and introduces more sophisticated tools and scenarios involving threat detection, incident response, and security automation.
-
Key Labs:
-
Active Directory Rights Management, PCAP Forensics
-
Advanced PowerShell Scripting and Automation
-
Linux Log Management (Systemd Journal)
-
Investigating Linux IOCs and Incident Response with Splunk
-
Lateral Movement Detection, Vulnerability Management with Greenbone
-
Advanced Firewall Policies (FortiOS) and Visual Spoofing
-
Botnet Takedown and Process Injection Techniques
-
Sudo Exploit Mitigation, Traffic Light Protocol for Information Sharing
-

Cybersecurity Essentials
This course provides a foundation in cybersecurity principles and key concepts. The labs focus on understanding the threat landscape, logging basics, network security, and governance.
-
Key Labs:
-
Introduction to Cybersecurity, Terminology, and History
-
Firewall, IDS/IPS Overview
-
Logging Overview (Windows Event Logs, Linux Syslog)
-
Cybersecurity Operations (SOC Introduction, Blue/Red Team Functions)
-
Network Fundamentals (OSI Layers, Layer 2-4 Networking)
-
Deploying Enterprise Endpoint and Server Protection
-
Cybersecurity Essentials Capstone Challenge
-

Junior SOC Analyst
This path focused on core SOC (Security Operations Center) skills, particularly log analysis, malware detection, and initial threat investigation. below are some key labs I completed to obtain this badge.
-
Key Labs:
-
Introduction to SOC (Linux Syslog, Windows Event Logs)
-
Splunk Basics (Fields, Transforms, Visualizations, Alerts)
-
Malware Analysis and YARA Rules
-
Email Header and URL Analysis
-
Wireshark Basics and Suricata IDS Rules
-
Threat Intel Challenges
-
Privilege Escalation and Remote Code Execution
-
-
