Information security continues to be one of the primary concerns for both commercial enterprises and government agencies. Yet there is a critical shortage of qualified information security professionals. Compounding this problem is keeping employees current and up-to-date on Cyber Security skills needed to protect, recognize threats and mitigate those threats is an ongoing serious challenge.

Clients need help in assessing, training and keeping security staff current so they can protect their IT investments in infrastructure, data, Internet applications, software development, and their corporate/agency reputation. In addition, hiring for cyber security skills is very difficult when relying only on resumes and certifications.

IT Cybersecurity Skills Assessment and Training Offering
IT Cybersecurity Skills Assessment and Training Offering
Home
Service Offerings
News and Events
Insights
Consultants
About ITPMG
Contact Us
Target audience
Back to Service Offerings
Description
ITPMG's new IT Cybersecurity Skills Assessment and Training Range Service addresses one of the key pillars of risk avoidance in the IT security environment - how skilled are the employees dedicated to ensure your information assets and technology are adequately protected.

This new IT Cybersecurity Skills Assessment and Training Range Service provides Persistent Cybersecurity Training in a game-like environment and was created by top hackers (security professionals) worldwide and is now used at the highest levels of government, military and intelligence within the U.S. and allied countries as the standard in skill assessment and rapid skill development for elite cyber defense forces.

The service tool offers a user-friendly interface, is capable of expanding challenges, and is suitable for individuals or entire teams. You can mix over 100 skill sets and over 60 challenges custom built to be used in a tool agnostic environment. Examples of these skills are:
Key Features:
Training Categories
CISO (primary), CLO, CIO, CFO, COO
Home
Senior executives who are responsible for the current and future state of an organization's IT Security skills, skill assessments and training processes and policies.
Privacy Policy
Site Map
Terms of Use
Disclaimers
Active Directory
APT Analysis
Binary Packers
Cisco Switch
Cryptogram
DDoS
Email
EXIF
File Forensics
Identity Theft
Linux
Memory Analysis
Multipath
NTLM
PEM
Reverse Engineering
Steganography
System Forensics
Threat Hunting
Web App Sec
Measure Practical Skills In Live Cyber Range
Portable/Standalone System or Cloud Based
Tool Agnostic With an On-Board Tools Library
Out-of-Box Challenges and Scenarios
Scalable from Beginner to Expert Level
Persistent Cyber Training Environment
Work Role/Mission Specific Training
Detailed Cyber PT Reporting
Engage Through Gamification
Individual or Teams Use Cases
Anti-Collusion Feature
Alt Data Streams
Backdoors
Blackhole
Cleartext
Cryptography
DHCP
Encoding/Decoding
Exploitation
File Recovery
Images
LSB
Metadata
MySQL
Obfuscation
PII
SCADA
Switching
TCP
UPX
Web Attacks
Anti-Reversing
BGP
Botnets
Command Injection
Data Leakage
Disk Forensics
Eternal Blue
File Carving
Forensics
Incident Response
Malware
MITM
Network Management
Offsets
Plaintext
SNMP & SNMPv1
Syslog
Telnet
Vigenere
Web Exploitation
APT
Binary Analysis
C2
Cracking
Databases
DNS
Exfiltration
File Corruption
FTP
IPv6
Malware Analysis
Modbus
NTFS
Password Cracking
Private Key
SQL Injection
System Corruption
TFTP
VoIP
Windows
This capability creates never-ending scenarios to challenge IT professionals in a game-like setting for both offensive and defensive skill development across a wide range of proficiency levels. You can also create your own set of challenges based on skill development your team needs.

We have training available for major threats, obscure tactics, and everything in-between via the content developed for our platform. Our reporting capabilities can offer a granular look at a team's real-world competency, as well as give detailed analysis data for improving team member skill gaps.

Our system has ready out-of-the box capabilities, is portable and doesn't require long approval/accreditation delays of most solutions and it is self-contained which means it never needs to be hooked to your/a network.

The net result is that you can test your employees against live threats, evaluate offensive and defensive capabilities and have an actionable growth strategy from the first day.
ITPMG's IT Cybersecurity Skill Assessment and Training Range Service is available as an appliance, a private cloud deployment or as a SaaS subscription. The appliance version is a portable stand-alone system that does not require Internet connection. The system can easily be transported by one person so it can be taken to where the employees are. Set-up is done in thirty minutes or less and can train twenty-five or more (depending on the system selected) participants simultaneously.
System Forensics
WAN
LAN
Network Forensics
Insider Threats
File Forensics
Binary Analysis
ITPMG's IT Cybersecurity Assessment and Training Service Categories:
VoIP
IoT
Misconfigured Devices
Reverse Engineering
APT
Cryptography
Web Attacks
The use of this service will provide valuable insights into how your Security staff is performing, what the skill deficiencies are, what the remediation/training recommendations are to close the deficiencies and the training itself.
Primary Beneficiaries
Incident Responders, Threat Analysts, Threat Hunters, SOC Analysts, Managers of Incident Response Team, Training Managers, Human Resources, Legal, CISOs