top of page

Completed Labs and Obtained Badges

RangeForce offers hands-on cybersecurity training that builds skills and knowledge in defensive security. If you're interested in SOC work, threat hunting, and SIEM, RangeForce provides a practical platform to develop and refine these skills. I have completed more than 400 labs on RangeForce and I am ranked among the top 10 learners.

Senior SOC Analyst

This advanced course builds on SOC 1 and introduces more sophisticated tools and scenarios involving threat detection, incident response, and security automation.

  • Key Labs:

    • Active Directory Rights Management, PCAP Forensics

    • Advanced PowerShell Scripting and Automation

    • Linux Log Management (Systemd Journal)

    • Investigating Linux IOCs and Incident Response with Splunk

    • Lateral Movement Detection, Vulnerability Management with Greenbone

    • Advanced Firewall Policies (FortiOS) and Visual Spoofing

    • Botnet Takedown and Process Injection Techniques

    • Sudo Exploit Mitigation, Traffic Light Protocol for Information Sharing

Screenshot 2024-08-27 200625.png
Cybersecurity Essentials

This course provides a foundation in cybersecurity principles and key concepts. The labs focus on understanding the threat landscape, logging basics, network security, and governance.

  • Key Labs:

    • Introduction to Cybersecurity, Terminology, and History

    • Firewall, IDS/IPS Overview

    • Logging Overview (Windows Event Logs, Linux Syslog)

    • Cybersecurity Operations (SOC Introduction, Blue/Red Team Functions)

    • Network Fundamentals (OSI Layers, Layer 2-4 Networking)

    • Deploying Enterprise Endpoint and Server Protection

    • Cybersecurity Essentials Capstone Challenge

Screenshot 2024-08-27 200506.png
Junior SOC Analyst

This path focused on core SOC (Security Operations Center) skills, particularly log analysis, malware detection, and initial threat investigation. below are some key labs I completed to obtain this badge.

  • Key Labs:

    • Introduction to SOC (Linux Syslog, Windows Event Logs)

    • Splunk Basics (Fields, Transforms, Visualizations, Alerts)

    • Malware Analysis and YARA Rules

    • Email Header and URL Analysis

    • Wireshark Basics and Suricata IDS Rules

    • Threat Intel Challenges

    • Privilege Escalation and Remote Code Execution

  •  

Screenshot 2024-08-27 200519.png
ByteHerWay
Notice: The images on this website are generated using the AI tool provided by the WIX platform.
bottom of page