Training for every cybersecurity role. Delivered how you learn best.
Upskill and get certified with 100s of hands-on labs, boot camps and role-based learning paths delivered live online, on-demand or in-person. All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles. Download our catalog to view the complete mapping.

Advanced Adversary Tactics Cyber Range
This cyber range covers a selection of the tactics and techniques represented in the MITRE ATT&CK® Matrix for Enterprise.

Advanced Python for Cybersecurity Cyber Range

Command Line Basics Cyber Range
This cyber range introduces the most common Linux and Windows command-line tools and utilities.

Common Attack Types Cyber Range
This cyber range covers different types of common attacks.
Computer Forensics Cyber Range

Cyber Threat Hunting Cyber Range
This cyber range contains labs that walk you through how to find different threats using different methodologies.

CySA+ Cyber Range
The CySA+ range walks a student through defensive activities that they will need to undertake to secure their networks and applications from attackers.

Linux Systems Administration Cyber Range
The Systems Administration cyber range will teach you some of the basics of linux systems administration.

MITRE ATT&CK: Collection Cyber Range
Learn the Collection tactics outlined in the MITRE ATT&CK framework.

MITRE ATT&CK: Command and Control Cyber Range
Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network.

MITRE ATT&CK: Credential Access Cyber Range
Learn the credential access tactics outlined in the MITRE ATT&CK framework.

MITRE ATT&CK: Defense Evasion Cyber Range
Learn the Defense Evasion tactics outlined in the MITRE ATT&CK framework.

MITRE ATT&CK: Discovery Cyber Range
Learn the Discovery tactics outlined in the MITRE ATT&CK framework.

MITRE ATT&CK: Execution Cyber Range
Learn the execution tactics outlined in the MITRE ATT&CK framework.

MITRE ATT&CK: Exfiltration Cyber Range
Learn about the techniques that adversaries may use to steal data

MITRE ATT&CK: Impact Cyber Range
Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes.

MITRE ATT&CK: Initial Access Cyber Range
Learn the initial access tactics outlined in the MITRE ATT&CK framework.

MITRE ATT&CK: Lateral Movement Cyber Range
Learn the Lateral Movement tactics outlined in the MITRE ATT&CK framework.

MITRE ATT&CK: Persistence Cyber Range
Learn the persistence tactics outlined in the MITRE ATT&CK framework.

MITRE ATT&CK: Privilege Escalation Cyber Range
Learn the privilege escalation tactics outlined in the MITRE ATT&CK framework.

MITRE ATT&CK: Reconnaissance Cyber Range
Learn the reconnaissance tactics outlined in the MITRE ATT&CK framework.

MITRE ATT&CK: Resource Development Cyber Range
Learn the resource development tactics outlined in the MITRE ATT&CK framework.
Network Traffic Analysis Cyber Range