Cyber Range

RHCSA

The labs

Train hands-on

  • Working with Stratis Filesystems

    RHEL 8 introduced a new simplified storage management solution called Stratis. Stratis implements the advanced features of some of the existing storage components to deliver file systems that are encapsulated within logical volumes. In this lab, you will practice working with Stratic to create, manipulate, and destroy file systems and storage pools.

  • Managing packages with DNF

    In this lab, you will practice working with DNF, or Dandified yum”. It is the next generation of the yum package manager that automatically computes dependencies and makes it easier to maintain groups of machines. DNF is the Red Hat’s new default package manager.”

  • Managing Application Stream Modules

    In this lab, you will practice working with DNF package manager to look up and manipulate application stream (AppStream) modules.

  • Understanding Linux Kernel

    Learn about the Linux kernel as you practice in the RHCSA Cyber Range.

  • Managing Units & System Tuning

    Practice working with systemd to manage units and control groups, and explore tuned, a system tuning service available in RHEL.

  • Creating and Managing Partitions

    Learn about creating and managing partitions as you practice in the RHCSA Cyber Range.

  • Storage Optimization with VDO

    Virtual Data Optimizer (VDO) is one of the newer RHEL features, which allows conserving disk space, improving data throughput, and saving on storage costs. In this lab, we will install VDO and use it to create and remove a volume.

  • Working with Logical Volume Manager

    Learn about the Logical Volume Manager (LVM) as you practice in the RHCSA Cyber Range.

  • Managing Packages with rpm

    Learn about managing packages with RPM as you practice in the RHCSA Cyber Range.

  • Working with XFS

    In this lab, you will practice working with X File System (XFS), including creating, mounting, and resizing XFS file systems in VDO, LVM, and Stratis logical volumes.

  • Working with Swap

    Learn about using swap as you practice in the RHCSA Cyber Range.

  • Working with Remote File Systems and AutoFS

    Practice working with Network File System (NFS) service and learn how to automatically mount NFS shares with AutoFS.

  • Network information and Chrony

    Learn about querying network information and about chrony as you practice in the RHCSA Cyber Range.

  • Using Key Based Authentication

    Learn how to generate, distribute, and use key-based authentication for SSH.

  • Managing Firewall

    Learn about managing firewalls, including firewalld, as you practice in the RHCSA Cyber Range.

  • Understanding & managing SELinux

    In this lab we’ll take a look at some of the tools for interacting with SELinux.

  • Basic Commands and Help

    Learn basic RHEL commands and gain hands-on experience as you practice in the RHCSA Cyber Range.

  • Job Scheduling

    Learn about job scheduling as you practice in the RHCSA Cyber Range.

  • Working with Processes and Jobs

    Practice common commands for working with processes, such as top, nice/renice, ps and kill, and manage jobs with bg and fg.

  • Regular Expressions & Metacharacters

    Learn about regular expressions and metacharacters as you practice in the RHCSA Cyber Range.

  • Bash Shell

    Learn about the Bash Shell as you practice in the RHCSA Cyber Range.

  • Managing Groups

    Practice creating, managing, and deleting group accounts on RHEL systems in this lab.

  • Managing Users

    Practice managing user accounts on RHEL systems, including creating, deleting, and setting passwords.

  • Access Control Lists

    Learn about access control lists (ACL), including file and directory ACLs, and default ACLs, as you practice in the RHCSA Cyber Range.

  • Special Permissions

    Learn about special permissions as you practice in the RHCSA Cyber Range.

  • File and Directory Permissions

    Learn about file and directory permissions as you practice in the RHCSA Cyber Range.

  • Finding and Linking Files

    This lab explores different options for finding files on RHEL systems, based on various criteria, such as size and permissions, and walks through the process of creating soft and hard links.

  • File and Directory Operations

    Learn about file and directory operations as you practice in the Linux Cyber Range.

  • File Path and File Types

    Learn about file paths and types as you practice in the RHCSA Cyber Range.

  • Using vi

    Learn about the visual editor as you practice in the RHCSA Cyber Range.

  • Compression and Archiving

    Explore compressing and archiving tools, such as gzip, gunzip, bzip2, bunzip2 and tar, as you practice in the RHCSA Cyber Range.

  • Login History and Information

    In this lab, you will work with common commands that display information about the system’s users and groups as well as other system information, including uptime and kernel information.

No software. No set up. Unlimited access.

Skip the server racks and spin up a realistic environment with one click. lnfosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every Infosec Skills subscription so your team can skill up however they learn best.

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client