
Apache Log4J Updates
The Apache Log4J vulnerabilities will be updated when new critical information is released. Please monitor this report for updates as this vulnerability continues to grow
Become a cyber professional by learning from leading cyber security experts and building critical on-the-job skills.
Unlock your skills in our gamified on-the-job simulator and level up to be a paid cybersecurity apprentice.
We’ve worked with leading employers in industries that include financial, retail, energy, healthcare and aerospace to co-design a training environment that helps you build confidence and master the professional skills that companies need.
Hands-on apprenticeships. Adaptive learning curriculum. Real-world training. Career placement. Using state-of-the-art AI, gamified live-fire threats, real-world projects and coaching from industry experts, RapidAscent Academy will help you build skills that are in-demand by leading companies.
The Apache Log4J vulnerabilities will be updated when new critical information is released. Please monitor this report for updates as this vulnerability continues to grow
In December 2021, Google took action to disrupt the Glupteba botnet, a sophisticated botnet which targets Windows machines and protects itself using blockchain technology.
A new critical remote code execution vulnerability in Apache Log4j2, a Java-based logging tool, was disclosed on 10 December 2021. There is no known proof-of-concept
We are in the process of launching our new pre-apprenticeship program in the Fall, sign up today to follow along!
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.
"*" indicates required fields
Duration: 6 months (optional apprenticeship with training)
Fundamentals that every cybersecurity professional needs
Select your career path
SOC (Security Operations Center) engineer career path trains you from a tier 1 SOC analyst level through an incident responder. You will be part of a team that is responsible for monitoring company networks and systems around the clock to defend against threats and will work to identify and respond to incidents.
Continue building on your skills in network traffic analysis to hunt threats and use the same tools you will use on the job. Analyze traffic in your cloud infrastructure and work in a team to defend your infrastructure. Perform Dark Web monitoring and triage SIEM tool alerts with ticketing systems you will use on the job.
Work in your team to identify Indicators of compromise (IOCs) and write Yara detection rules to detect IOCs of threat actors targeting your company. Write scripts to automate detection and analysis, remove malware from company systems, and continue building your threat hunting skills.
Work in your incident response team to investigate alerts escalated by the SOC tier 2 team and respond to live-fire incidents. Build IR playbooks and hunt advanced threats. Identify attack pathways to your company’s critical assets and build defenses against live-fire attacks from instructors. Analyze and reverse engineer advanced malware samples and perform forensic investigations.
The Penetration Tester (Pen Tester) career path prepares you for an intermediate level pen tester career. You will be responsible for performing internal and external penetration testing of a company’s network and applications. You and your team will use your skills to attack the networks of other teams using the latest hacking techniques. You will use your social engineering skills to bypass a company’s defenses without being caught and communicate the findings of your penetration test to stakeholders across the organization.
Work in your team to execute network penetration tests in different industries and communicate your pen test findings to the executive team. Hands-on projects where you learn to live off the land and not rely on hacking tools that are easy for the defensive team to detect.
Write your own hacking tools and use them to legally break into companies. Continue building your pen testing skills as your team hacks the networks of other teams in live-fire events.
Build more complex pen testing tools. Work in your team to perform web application penetration testing for real businesses and help them secure their systems better.
The Cloud Security Engineer career path builds your skills using the leading public cloud platforms, Amazon AWS and Microsoft Azure. You will build cloud infrastructure and networks, monitor and secure them. You will gain hands-on experience with cloud secrets management, built-in AWS and Azure tools for security and third-party tools used by leading companies.
Work in your team to help companies migrate to the cloud and build, secure and monitor your cloud infrastructure. Manage and restrict access to critical resources in the cloud.
Scan your cloud environment with tools like Nmap and Metasploit to identify exploitable vulnerabilities. Write custom scripts to locate private S3 buckets and attack and secure APIs.
Attack and secure database services, like Aurora, with your team in live-fire events. Locate and secure EC2 instances, attack WordPress websites and learn how to harden them against attack.
The Security Engineer career path prepares you to design, build, and implement security solutions for companies. You will leverage your threat hunting skills to identify new attack routes and build defenses against them and develop information security strategy for organizations. Build business continuity and disaster recovery plans for companies.
Work in your team to identify critical assets, services and data for the company. Identify and prioritize risks to these and build a plan to manage risk. Develop policies and processes to maintain full visibility into your digital and physical assets and their interconnections.
Analyze incidents with your team and build detection engineering capabilities to reduce the risk to critical assets, data and services. Build continuous monitoring solutions to improve the company’s security posture.
Develop strategies to help companies recover and restore capabilities and services following a cyber-attack. Work in your team to architect networks for security across industries.
The Risk Engineer career path prepares you to build risk models and help companies remain compliant with governing bodies and lower their exposure to risk. This path can prepare you for a number of GRC (governance, risk, and compliance) careers.
Work in your team to help companies improve their external security posture and security score. With your team, identify pathways to critical assets and communicate your findings to senior stakeholders.
Work in your team to perform risk assessments and weigh the needs of businesses and critical operations against the security concerns and then effectively communicate this information to senior executives.
Work with real companies to build roadmaps to improve the security posture of companies, so they can reduce their cybersecurity insurance premiums and reduce their organizational risk in the long-term. Assess the impact of software supply chain compromise attacks (I.e.- SolarWinds) and recommend ways companies can reduce their risk exposure.