© 2018 by LightStorm Security LLC

Training - Strategy and Philosophy

LightStorm Security believes that cybersecurity training should be structured in a building block format with a focus on practical application. Students learning to perform in a specific role must understand how that role fits in to a security posture as compared to the other roles, and must understand the base knowledge areas, skills, and concepts of cybersecurity.  Because of this, LightStorm Security delivers training for a job-role in a tiered method, ensuring the students learn and apply concepts in their role while building on the concepts learned previously. This method allows the students to develop the "muscle memory" necessary to perform their assigned tasks while also developing their critical thinking skills to be able to adjust and adapt with the big picture in mind.

Each program has three tiers, or phases, associated with it: Preparatory, Foundational, and Job Role.  

     The Preparatory phase is comprised of knowledge areas and technical skills necessary for all roles in cybersecurity.         Topics include cybersecurity domains and their interactions, malware, operating systems, and data communication. 

     The Foundational phase is comprised of the core concepts of cybersecurity operations, including the methods used       by threats, data collection and aggregation, and the basics of network analysis. All cybersecurity job roles tie back         to these concepts in one form or another, and understanding these concepts allows the students to understand the       purpose behind their role.

     The Job Role phase focuses on the actual tools, tasks, and techniques of the selected role. 

Job Role Phase
Foundational Phase
Preparatory Phase

By structuring the curriculum in this manner the students learn a concept, apply the concept and then move on to the next building block where they will continue to apply the concept, along with others learned, in progressively more advanced and realistic ways.  By the completion of the program the students will have reduced numerous concepts and techniques to repeatable tasks that they can complete upon return to their organization. This allows the student to perform in a job role immediately, providing value not only to the students' own career, but to the organization. 

Scroll down to see the current training programs. New roles are also under development. If there is a specific role you are interested in, feel free to Contact Us about it!

Job Role - Vulnerability Analyst

The Vulnerability Analyst training program covers the tools, techniques, skills and knowledge areas involved in the job role of a vulnerability analyst.  A vulnerability analyst is responsible for assessing applications for known vulnerabilities, identifying corrective measures, and analyzing risk associated with the corrective measures.

For more information about the Vulnerability Analyst training program, Contact Us.

Job Role - Penetration Tester

The Penetration Tester training program instructs the student in the concepts, techniques, tools, and utilities used in penetration testing. Penetration testers are responsible for assessing the security posture of a system by mimicking the actions of a malicious actor. By attempting the same actions as a threat, the tester identifies security issues and their real-world implications. Once identified, the issues can be addressed to improve the overall security of the system.

For more information about the Penetration Tester training program, Contact Us.

Job Role - SOC Analyst

The SOC Analyst training program covers the knowledge areas, concepts, tools, and techniques required to work in a SOC role. The SOC is responsible for data aggregation and analysis of events on the network, and is generally the "ground zero" for identifying issues on the network. The SOC Analyst will collect the data behind identified incidents on the network and determine whether the incident is a "false positive" (no actual issue) or an actual problem. Once identified as a problem, the analyst will then either determine the root cause of the incident, or pass the event on to a more experienced analyst pursuant to the organizations' policies.

For more information about the SOC Analyst training program, Contact Us.

Job Role - Incident Responder

The Incident Responder training program focuses on the concepts, tools, techniques and knowledge areas of incident triage and forensics. This role works alongside, and takes from, the SOC Analyst. When an incident is identified, the Responder collects all relevant data from affected systems, network devices, and data collection. When necessary, the responder will utilize forensic collection tools to retrieve this data. The responder is responsible for determine the cause and impact of the incident, and returning the affected systems to proper working order.

For more information about the Incident Responder training program, Contact Us.