Information security continues to be one of the primary concerns for both commercial enterprises and government agencies. Yet there is a
critical shortage of qualified information security professionals. Compounding this problem is keeping employees current and up-to-date on Cyber
Security skills needed to protect, recognize threats and mitigate those threats is an ongoing serious challenge.
Clients need help in assessing, training and keeping security staff current so they can protect their IT investments in infrastructure, data,
Internet applications, software development, and their corporate/agency reputation. In addition, hiring for cyber security skills is very difficult
when relying only on resumes and certifications.
IT Cybersecurity Skills Assessment and Training Offering
IT Cybersecurity Skills Assessment and Training Offering
Target audience
Description
ITPMG's new IT Cybersecurity Skills Assessment and Training Range Service addresses one of the key pillars of risk avoidance in the IT
security environment - how skilled are the employees dedicated to ensure your information assets and technology are adequately protected.
This new IT Cybersecurity Skills Assessment and Training Range Service provides Persistent Cybersecurity Training in a game-like
environment and was created by top hackers (security professionals) worldwide and is now used at the highest levels of government,
military and intelligence within the U.S. and allied countries as the standard in skill assessment and rapid skill development for elite cyber
defense forces.
The service tool offers a user-friendly interface, is capable of expanding challenges, and is suitable for individuals or entire teams. You can
mix over 100 skill sets and over 60 challenges custom built to be used in a tool agnostic environment. Examples of these skills are:
Key Features:
Training Categories
CISO (primary), CLO, CIO, CFO, COO
Senior executives who are responsible for the current and future state of an organization's IT Security skills, skill assessments and
training processes and policies.
• Active Directory
• APT Analysis
• Binary Packers
• Cisco Switch
• Cryptogram
• DDoS
• Email
• EXIF
• File Forensics
• Identity Theft
• Linux
• Memory Analysis
• Multipath
• NTLM
• PEM
• Reverse Engineering
• Steganography
• System Forensics
• Threat Hunting
• Web App Sec
• Measure Practical Skills In Live Cyber Range
• Portable/Standalone System or Cloud Based
• Tool Agnostic With an On-Board Tools Library
• Out-of-Box Challenges and Scenarios
• Scalable from Beginner to Expert Level
• Persistent Cyber Training Environment
• Work Role/Mission Specific Training
• Detailed Cyber PT Reporting
• Engage Through Gamification
• Individual or Teams Use Cases
• Anti-Collusion Feature
• Alt Data Streams
• Backdoors
• Blackhole
• Cleartext
• Cryptography
• DHCP
• Encoding/Decoding
• Exploitation
• File Recovery
• Images
• LSB
• Metadata
• MySQL
• Obfuscation
• PII
• SCADA
• Switching
• TCP
• UPX
• Web Attacks
• Anti-Reversing
• BGP
• Botnets
• Command Injection
• Data Leakage
• Disk Forensics
• Eternal Blue
• File Carving
• Forensics
• Incident Response
• Malware
• MITM
• Network Management
• Offsets
• Plaintext
• SNMP & SNMPv1
• Syslog
• Telnet
• Vigenere
• Web Exploitation
• APT
• Binary Analysis
• C2
• Cracking
• Databases
• DNS
• Exfiltration
• File Corruption
• FTP
• IPv6
• Malware Analysis
• Modbus
• NTFS
• Password Cracking
• Private Key
• SQL Injection
• System Corruption
• TFTP
• VoIP
• Windows
This capability creates never-ending scenarios to challenge IT professionals in a game-like setting for both offensive and defensive skill
development across a wide range of proficiency levels. You can also create your own set of challenges based on skill development
your team needs.
We have training available for major threats, obscure tactics, and everything in-between via the content developed for our platform.
Our reporting capabilities can offer a granular look at a team's real-world competency, as well as give detailed analysis data for
improving team member skill gaps.
Our system has ready out-of-the box capabilities, is portable and doesn't require long approval/accreditation delays of most solutions
and it is self-contained which means it never needs to be hooked to your/a network.
The net result is that you can test your employees against live threats, evaluate offensive and defensive capabilities and have an
actionable growth strategy from the first day.
ITPMG's IT Cybersecurity Skill Assessment and Training Range Service is available as an appliance, a private cloud deployment or as a
SaaS subscription. The appliance version is a portable stand-alone system that does not require Internet connection. The system can
easily be transported by one person so it can be taken to where the employees are. Set-up is done in thirty minutes or less and can
train twenty-five or more (depending on the system selected) participants simultaneously.
• System Forensics
• WAN
• LAN
• Network Forensics
• Insider Threats
• File Forensics
• Binary Analysis
ITPMG's IT Cybersecurity Assessment and Training Service Categories:
• VoIP
• IoT
• Misconfigured Devices
• Reverse Engineering
• APT
• Cryptography
• Web Attacks
The use of this service will provide valuable insights into how your Security staff is performing, what the skill deficiencies are, what the
remediation/training recommendations are to close the deficiencies and the training itself.
Primary Beneficiaries
Incident Responders, Threat Analysts, Threat Hunters, SOC Analysts, Managers of Incident Response Team, Training Managers,
Human Resources, Legal, CISOs