Constantly expanding in content
depth and breadth
Breadth
New task-oriented modules
- New vulnerabilities in devices & O/S
- New types of threats and exploits
- New skills, or new tasks (best practices)
- New approaches to architecture and development

Breadth
cybersecurity simulators
- Execute operational tasks
- Reinforces and validates task mastery
- Effective teamwork and leading teams on tasks of differing complexity
- Larger detection, response, and recovery simulations
Depth
Covers a wide variety of
- Operating systems
- Devices (switches, IoT, etc.)
- Cloud-based services
- Networks
- Data center and system architectures
- System management best practices
- Software development architecture & best practices


Depth
Role-specific trainings
- Deeper, more skilled task simulation based on recent breaches
- More advanced role tasks and skills including Incident Response, Cloud Security, Threat Hunting, Advanced Monitoring and Forensics
- Reinforcing deeper analysis, tool integration, and best practices
- On-site team projects with enterprise-related exercises