Infosec Skills Challenge: January 2022


  • Advanced Adversary Tactics – Persistence 2 Lab — 00:30:00
    • This lab covers multiple techniques related to persistence including creating a malicious browser extension and modify system processes.

  • Security+ – Cryptography Lab — 00:30:00
    • When using the Internet, users retrieve or share information. Depending on the application, purpose, and implementation methods, the need to provide data confidentiality, integrity, and authenticity emerges. To ensure these requirements are fulfilled and that only authorized parties have access to the data, the information transmitted over the Internet is obfuscated.

  • CySA+ Indicators of Compromise Lab — 00:30:00
    • Indicators of compromise (IOCs) are forensic data found in system log entries or files that identify conceivably malicious activity on a system or network. They assist information security and IT professionals in detecting data breaches, malware infections, or other threat activities. By monitoring IOCs, businesses can identify attacks and act quickly to stop violations from occurring or limit damages by preventing attacks in earlier stages.

      Indicators of compromise are vital components that lead information security and IT experts to discover malicious activity in the early stages. These unexpected actions are the red flags that indicate a possible or in-progress attack that could lead to a systems compromise. Moreover, IOCs are not constantly effortless to detect. They can be as simple as EXIF data components or astonishingly complex malicious code. Security Analysts frequently collect and classify many IOCs just to look for correlations and piece them together to analyze a potential threat or incident.


Course description

We’ve bundled three hands-on labs to put your cybersecurity skills to the test. Start out by getting hands-on with common Cryptography techniques, like digital signatures, to protect private information. Moving on to the second lab, you’ll work to discover the early stages of malicious activity to help prevent a cyber attack. Once you’ve successfully defended against any threats, you’ll take on the role of the adversary by creating a malicious browser extension and modifying system processes.

You're in good company


We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus


This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson


We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
2021 G2 Summer - Leader - Tech Skills Dev, Online Course, eLearning Content
Top 20 Company - Online Learning Library