
Official 2023 Global Partner of Black Hat.
Booth D11: Black Hat Asia, Marina Bay Sands, Singapore May 9-12 2023
Learner, Instructor, Lab Developer, Manager?
Unleash Your Cyber Security Potential Today.
#BeAheadOfTheCyberGame
Advance your Cyber Security capability no matter which kind of Ha(t)cker you are.

UNITING HA(T)CKERS WORLDWIDE.
Join the CYBER RANGES community and advance your Cyber Security capability as a learner or trainer, through experiential learning and training and challenge-focused exercises. #BeAheadOfTheCyberGame
Discover your ha(t)cker expertise and get exclusive access to a playlist of CYBER RANGES simulation labs uniquely designed for your style.
A UNIQUE HAT TRICK OF ESSENTIAL PLAYLISTS FOR BLACK HAT 2023




Note: All playlists comprise of modules with hands-on practical labs that provide you with knowledge and skills and assess your abilities on the skill or tool being taught.
Playlists: 5
Scenarios: 28
Click the button below to learn more and purchase this playlist.
If you are logged in to your app.cyberranges.com account already you will be directed to the playlist, if not please register, login and click the link below or search for Red Team Essentials.
Blue Team Essentials
The Blue Team Essentials playlist is designed for students and cybersecurity professionals looking to kick off their journey in defensive cybersecurity and to transition into the SOC Analyst role.
.
A SOC analyst (Security Operations Center analyst) is a cybersecurity professional responsible for monitoring and detecting security incidents and threats within an organization's network infrastructure.
.
The primary responsibilities of a SOC analyst include monitoring network traffic, analyzing security alerts, identifying potential security incidents, investigating security incidents, and coordinating with other teams to remediate security incidents.
.
This playlist was developed and structured based on feedback and data gathered from recruiters and cybersecurity companies around the world, it is designed to introduce students to key knowledge and skills required to operate effectively as a SOC analyst.
- Logging Fundamentals – This is the starting point for any SOC analyst, it is vitally important to understand how logging works on both Windows and Linux. This playlist will introduce you to Windows event logs, logging on Linux and how to analyse and understand logs from various operating systems.
- ELK Stack Fundamentals - The ELK (Elasticsearch, Logstash and Kibana) stack is a popular open-source software stack used for log management and analysis. This playlist will teach you how to properly install and configure ELK for log management and analysis.
- Threat & Log Analysis – This playlist is designed to build on the knowledge, skills and abilities covered in the first two playlist and covers the process of how to analyse threats, alerts and logs from Windows and Linux systems with popular tools like Velociraptor and Zeek.
- Network Traffic Analysis – This playlist will introduce you to the fundamentals of performing network traffic analysis with Wireshark and TCPDump. It also covers the process of threat hunting with Arkime.
- Memory Forensics Fundamentals – This playlist will introduce you to the fundamentals of memory forensics and covers skills ranging from memory acquisition to memory analysis with tools like Volatility.
Note: All playlists comprise of modules with hands-on practical labs that provide you with knowledge and skills and assess your abilities on the skill or tool being taught.
Playlists: 5
Scenarios: 55
Click the button below to learn more and purchase this playlist.
If you are logged in to your app.cyberranges.com account already you will be directed to the playlist, if not please register, login and click the link below or search for Red Team Essentials.
Red Team Essentials
The Red Team Essentials playlist is designed for Penetration Testers and Red Teamers looking to improve their Offensive Security/Pentesting competencies (knowledge, skills, and abilities).
.
A Pentester or red teamer is a cybersecurity professional who specializes in evaluating the security of computer systems, networks, and applications by simulating attacks on them. The main goal of a Pentester is to identify vulnerabilities and weaknesses in the target system and provide recommendations for remediation to improve the overall security posture of the organization.
.
This playlist is designed to provide students and cybersecurity professionals the knowledge skills and abilities required to operate effectively as a penetration tester.
- Ethical Ninja Hacking Series – This playlist is an introductory playlist designed for students looking to get started in penetration testing and covers information gathering, vulnerability assessment, exploitation, and the basics of using the Metasploit Framework (MSF).
- Credential Bruteforcing - This playlist will teach you how to perform brute force attacks with tools like Hydra against different services on protocols.
- Hash Cracking - This playlist will introduce students to hash cracking and covers the process of cracking Windows and Linux password hashes with tools like Hashcat and Jon The Ripper.
- Exploiting Common Vulnerabilities & Exposures (CVEs) - This playlist contains a series of scenarios that will teach you how to identify and exploit the latest CVEs affecting Windows, Linux, and third-party solutions.
- Essential Pentesting Tools - This playlist is designed for penetration testers and red teamers. It covers the usage of various essential Pentesting tools ranging from CrackMapExec to Impacket and Mimikatz.
- Metasploit Framework – This playlist is designed to introduce you the Metasploit Framework and covers the process of how to use the Metasploit Framework for information gathering, enumeration, exploitation and post-exploitation.
- Introduction To C2 Frameworks - This playlist will introduce you to the fundamentals of C2 frameworks and covers the setup and usage of popular C2 frameworks like Covenant, Havoc, Sliver and PowerShell-Empire.
Note: All playlists comprise of modules with hands-on practical labs that provide you with knowledge and skills and assess your abilities on the skill or tool being taught.
Playlists: 3
Scenarios: 25
Click the button below to learn more and purchase this playlist.
If you are logged in to your app.cyberranges.com account already you will be directed to the playlist, if not please register, login and click the link below or search for Red Team Essentials.
Purple Team Essentials
The Purple Team Essentials playlist is designed for Red and Blue Teamers looking to improve their competencies (knowledge, skills, and abilities) in Adversary Emulation and Cyber Threat Intelligence
.
Purple teaming is a cybersecurity term that refers to a collaborative approach between the red team and the blue team to improve an organization's overall security posture.
.
A purple teamer is a cybersecurity professional who specializes in conducting and facilitating purple team exercises. They work with both the red and blue teams to design, execute, and analyze simulated attacks on an organization's systems, applications, and infrastructure.
Purple teamers play a critical role in helping organizations to identify and address vulnerabilities in their cybersecurity defenses. They are in high demand in the cybersecurity industry, particularly as more organizations recognize the importance of taking a collaborative and proactive approach to cybersecurity.
- Introduction To OSINT – This playlist contains scenarios that cover the fundamentals of OSINT from Google Dorking to reverse image searching and Social Media reconnaissance.
- MITRE ATT&CK Fundamentals – This playlist will introduce you to the MITRE ATT&CK framework, MITRE ATT&CK navigator, threat intelligence with MITRE ATT&CK and using SIGMA rules.
- MITRE ATT&CK Defender – Adversary Emulation Fundamentals - This playlist will introduce you to the fundamentals of adversary emulation with the MITRE ATT&CK Framework.
- Adversary Emulation with Atomic Red Team - This playlist will teach you how to use Atomic Red Team tests for adversary emulation and covers the process of hunting and detecting IOCs.
Note: All playlists comprise of modules with hands-on practical labs that provide you with knowledge and skills and assess your abilities on the skill or tool being taught.
Playlists: 13
Scenarios: 108
Click the button below to learn more and purchase this playlist.
If you are logged in to your app.cyberranges.com account already you will be directed to the playlist, if not please register, login and click the link below or search for Red Team Essentials.
Black Hat Essentials Collection
Invest in the full Black Hat Essentials Hat Trick
PEEK BEHIND THE CURTAINS,
#BEAHEADOFTHECYBERGAME
Stay updated on all of CYBER RANGES updates and happenings at Black Hat 2023 by joining the @CYBER RANGES Community.
Sponsored Session
Top 10 Abilities: Expediting Cyber Security Capability Through Job-Role Specific Experiential Training to Achieve Cyber Agility and Resilience
- Thursday, May 11, 2023 2:55 PM to 3:20 PM · 25 min. (Singapore)
- Business Hall Theatre B
- George Nicolaou – CTO CYBER RANGES

On-Demand Zone
Next-Gen Cyber Ranging based on the latest cyberthreat intel for Identifying, Selecting, Developing, Validating Cybersecurity Competency, Capability And Resilience
- Dr Almerindo Graziano · CYBER RANGES
- Stan Wisseman · Cyber Res
- Jim Foote · Cyber Res
Download Information on CYBER RANGES
Learn more about CYBER RANGES and how we can help you bring about real change in our organization through the adoption of a premium-quality Cyber Range.
CYBER RANGES Information Pack

Ultimate Guides To Cyber Security Bundle

‘Understanding Cyber Ranges from Hype to Reality’
