© All rights reserved.
Cyber Struggle Cyber Struggle
  • Home
  • Company
    • About Us
    • CS Internals
    • CS Manifesto
    • Open Letter for Ranger Grads
    • Careers
    • Press and Media
    • Contact Us
    • GDPR Notification
  • Products
    • S-46 Platform
  • Courses
    • Ranger Certification
      • Ranger Certification
      • Ranger Grad Feedbacks
    • Aegis Certification (New)
      • Aegis Certification
      • Aegis Grad Feedbacks
    • Contemporary Certifications
      • Cyber Struggle Tactical Pistol Operator
  • For Corporates
  • Resources
    • Articles
    • Threat Reports
    • Tools
    • Announcements
  • Community
    • Community Programs
      • Ribbon Program
    • Delta Group
0
Cyber Struggle

RANGERS LEAD THE WAY

Special Forces of
Cyber World

Watch Ranger

RANGER certification is the premium certification of Cyber Struggle. It is f2f intensive training to provide great hybridity and advanced topics in both technical offensive and defensive skills, soft skills and social science perspective.

Cyber Struggle Ranger is considered as the world’s most intense and difficult cybersecurity industry certification.

General Overview

RANGER Certification Coverage

Our trainees who are entitled to receive their certificates and badges are not only qualified in the aspects of technical domains of cybersecurity, but also they identify the concept of security within the unconventional warfare process. This way of thinking and evaluating the process enables them to acquire a 360-degree expertise and increases their mental toughness, leadership and teaming skills, also adaptive thinking abilities to another level, which is required for an ideal expert.

During the program, trainees focus on not only advanced topics in the offensive part of cybersecurity, but also simulate the threat hunting and intelligence process while they are improving their soft skills to special forces level

Join your class and earn your RANGER certification.

Select Your Class

Offensive Labs

With offensive lab, candidates are introduced to attacking systems and to the penetration testing process

Standalone Missions

Standalone missions feed candidates to help them to think out of the box and to provide solutions for different set of attack cases

Strategic/Tactical Thinking

Candidates increase their strategical and tactical thinking with different story based different attacks and standalone missions

Intelligence Studies

Field and in-class exercises for intelligence methodologies, prioritization, spotting, engagements, approaching, cover story and tiger team exercises to have intelligence mindset

Tactical Teaming/Leadership

Adaptation to dynamically changing and uncertain situation with the team. Tactical team management and leadership

SOC Labs

With investigation lab, candidates get hands on experience to analyze logs, traffic, malware, common attacks and detection techniques

Regular Reports

Candidates write regular reports for detection, investigation process. There are also prioritization and strategy building reports in place

Uncertainty Doctrine

Like real life cases, candidates have low visibility about standalone missions, timing of the attack they would face. Candidates need to improve adaptive thinking skills

Intense Execises

Authoritatively visualize extensive paradigms and leading-edge scenarios. Authoritatively facilitate team.

Field Exercises

2 Field exercises with retired special forces to have better insight and psychological readiness for incidents. Mental toughness

With Successful certification

RANGER holders can

Join Your Class
  • Develop sophisticated exploits
  • Create custom shellcodes and perform heap sprays
  • Work as a red teamer or Tier 3-4 SOC Analysts/Manager or Threat Hunter
  • Collect, analyze better intelligence
  • Evade DEP and ASLR Protection
  • Prioritize attacks and missions to make better decisions
  • Identify advanced post-exploitation techniques
  • Write advanced correlations including both offensive and defensive topics
  • Find product independent solutions for certain problems
  • Provide strategical, operative and tactical leadership
  • Keep ideal performance state under intense pressure
  • 360-degree visual including, criminology, profiling, terrorism and cyber

Certification Enrollment

Pre-requisites

No prior certification requirement until ALPHA certification is announced

Basic scripting, knowledge about fundamental networking and common services would be big plus. Additionally, basic linux and windows operating system knowledge is required.

Cost: Based on the Chapter and Country you will attend. Please look at the upcoming certifications or contact us
Duration: There are two options;

  • Option 1: 25 days 7/24
  • Option 2: Weekends/10 weeks and online during the week after business hours.

HELL WEEK

Examination Process

  • Offensive Part
    01
    The offensive exam is conducted among five servers and root status is expected for at least four of them. In addition, the trainee is required to conduct a penetration test for an existing web application and finalize the testing report.
  • Investigative Part
    02
    This is the phase of the exam where the trainee analyzes provided logs, malwares, shellcodes and traffics like Security Operation Center Analyst. A general analysis report is later prepared regarding the root cause.
  • Hybrid Article
    03
    The required output of this phase is a complete article about either the application or the correlation of social sciences and complementary courses on cybersecurity process. The article is neither expected to be perfectly academic nor be like a daily newspaper article. It needs to either provide/ criticize an opinion or propose a new way of thinking on the subject. The article should be written within the general rules of article writing, and the sources of information need to be clearly provided.
  • Field Drill
    04
    This is the final phase of Hell Week. In this stage, the trainee is expected to improve her/his mental capabilities by pushing personal limits further. Thus, the trainee is required to use knowledge learned during the program and create solutions in harmony with her/his team without giving up under any circumstances or any level of stress. A trainee who withdraws during field application cannot receive the certificate.

Cyber Struggle Ranger

Application Process

  • Selection of Upcoming Trainings
    02
    Candidates will make a selection of chapter and upcoming certification training.
  • Application Form
    01
    Please ensure you complete all the information in detail. Forms with any unfulfilled areas are not taken into consideration.
  • Evaluation
    03
    The questions on our form are prepared to identify your candidate profile; this structure also provides us the information needed to create a class of attendees in the most optimal way. After the evaluation of the forms, applicants who are considered to attend the Ranger training program are contacted via phone/skype for an interview. Candidates are rarely invited for a face-to-face interview in this step of the process.
  • Confirmation
    04
    Once the interview process is finalized and considered positive, we contact our applicants to confirm their attendance and send the payment links. Withdrawal from the program after this step should only be considered in case of very significant excuses.

Select your Chapter/Session and join your RANGER class!

ChapterCityLanguageDateDuration Remaining SeatEnrollment
Bosphorus ChapterIstanbulLocal Language05.10.2019Option 10
Bosphorus ChapterIstanbulLocal Language12.07.2019Option 10
Bosphorus ChapterIstanbulLocal Language19.01.2019Option 10
Bosphorus ChapterIstanbulLocal Language13.01.2020Option 20
Europe ChapterBudapestEnglishApril 2020Option 24
image
F.A.Q
Support Forum
Video Tutorials

Search panel can contain any widgets and shortcodes.

Call us: 0 800 255 22 55