Incident Response Trainings
As part of our Incident Response training, the following solutions are available
Click on the logo for the agenda
Unique Features of the "Incident Response" Training Available at Our Educational Center
1. Training with Advanced EDR/XDR Tools Led by Cybersecurity Experts
Participants learn incident management using forensic (Forensics and Threat Hunting) tools available in commercial EDR/XDR solutions, the same ones used in enterprises. The training is conducted by an expert in the EDR/XDR solution chosen by the participants.
2. Training in a Realistic Cyber Range Environment
Participants practice in a "Cyber Range" designed to resemble a real IT system, including elements most frequently targeted by cybercriminals, such as Active Directory and domain controllers, MS SQL Server, MS Exchange, MS CA, etc. The "Cyber Range" does not contain any artificial "capture the flag" machines—only real systems and vulnerabilities exploited in actual cyberattacks.
3. Real Cyberattack Scenarios Based on Threat Intelligence
Incident management training is conducted using realistic hacking scenarios observed in real-world breaches. The scenarios cover complete attack paths—from initial access and discovery through privilege escalation, credential harvesting, and lateral movement, all the way to the takeover of domain controllers and other critical systems.
4. Complex Cyberattack Scenarios Supported by the Cyber Soldier Educational Application
Participants do not need to be professional pen-testers to execute real, complex cyberattack scenarios. This is made possible through the Cyber Soldier educational application.
5. Opportunity to Improve "Incident Response" Skills in a Production Environment
IT and SOC employees who complete the training in the "Cyber Range" can further refine their practical incident response skills in their production environment. This allows them to assess the effectiveness of their organization's incident detection tools and improve their usage under conditions similar to a real cyberattack. All cyberattack scenarios available in the Cyber Soldier application are realistic (based on Threat Intelligence), making them suitable for execution in production environments - more invasive scenarios require proper approval.