Cyber Range

Linux

This cyber range helps you develop your knowledge of how to use Linux systems by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of Linux topics, including basic commands, file and directory operations and attributes, permissions, job scheduling and much more. You’ll also learn about managing SELinux, packages, extended file systems, firewalls, and units and control groups.

The labs

Train hands-on

  • Regular Expressions and Metacharacters

    Learn about regular expressions and metacharacters as you practice in the Linux Cyber Range.

  • Working with XFS and VFAT File Systems

    Learn about working with XFS and VFAT (Virtual File Allocation Table) file systems as you practice in the Linux Cyber Range.

  • Special Permissions

    Learn about special permissions as you practice in the Linux Cyber Range.

  • Working with Logical Volume Manager

    Learn about the Logical Volume Manager (LVM) as you practice in the Linux Cyber Range.

  • File and Directory Control Attributes

    Learn about file and directory control attributes as you practice in the Linux Cyber Range.

  • Understanding and Managing SELinux

    Gain insight into managing SELinux as you practice in the Linux Cyber Range.

  • File Path and File Types

    Learn about file paths and types as you practice in the Linux Cyber Range.

  • Access Control Lists

    Learn about access control lists (ACL), including file and directory ACLs, and default ACLs, as you practice in the Linux Cyber Range.

  • Compression and Archiving Tools

    Explore compressing and archiving tools, such as gzip, gunzip, bzip2, bunzip2 and tar, as you practice in the Linux Cyber Range.

  • System Logging

    Learn about system logging, including syslog, as you practice in the Linux Cyber Range.

  • Basic Commands

    Learn basic Linux commands and gain hands-on experience as you practice in the Linux Cyber Range.

  • Understanding Linux Kernel

    Learn about Linux kernel as you practice in the Linux Cyber Range.

  • TCP Wrappers

    Explore TCP wrappers as you practice in the Linux Cyber Range.

  • Managing Packages with RPM

    Learn about managing packages with RPM as you practice in the Linux Cyber Range.

  • Creating Storage Pools and Volumes

    Learn about creating storage pools and volumes as you practice in the Linux Cyber Range.

  • Working with Processes

    Learn about working with processes, such as nice/renice, ps and kill, as you practice in the Linux Cyber Range.

  • Using Swap

    Learn about using swap as you practice in the Linux Cyber Range.

  • Bash Shell

    Learn about Bash Shell as you practice in the Linux Cyber Range.

  • Creating and Managing Extended File Systems

    Learn about creating and managing extended file systems as you practice in the Linux Cyber Range.

  • File and Directory Permissions

    Learn about file and directory permissions as you practice in the Linux Cyber Range.

  • Creating and Managing Partitions

    Learn about creating and managing partitions as you practice in the Linux Cyber Range.

  • File and Directory Operations

    Learn about file and directory operations as you practice in the Linux Cyber Range.

  • Managing Firewall

    Learn about managing firewalls, including iptables and firewalld, as you practice in the Linux Cyber Range.

  • VI Editor and Help

    Learn about the visual editor as you practice in the Linux Cyber Range.

  • Managing User and Group Accounts

    Learn about managing user and group accounts, including creating, deleting and passwords, as you practice in the Linux Cyber Range.

  • Login History and System information

    Learn about login user and group info, history info and system info as you practice in the Linux Cyber Range.

  • Managing Units and Control Groups

    Learn about managing units and control groups, including systemctl, as you practice in the Linux Cyber Range.

  • Managing Packages with Yum

    Learn about managing packages with Yum as you practice in the Linux Cyber Range.

  • Network Information and NTP

    Learn about Network Time Protocol (NTP) as you practice in the Linux Cyber Range.

  • Job Scheduling

    Learn about job scheduling as you practice in the Linux Cyber Range.

  • Defining a NAT Virtual Network

    Learn about defining a Network Address Translation (NAT) virtual network as you practice in the Linux Cyber Range.

No software. No set up. Unlimited access.

Skip the server racks and spin up a realistic environment with one click. lnfosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every Infosec Skills subscription so your team can skill up however they learn best.

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client