Welcome to The Cyber Range! (Cyber Internships Available)

As a community member, you’ll have access to a LIVE production SOC (Security Operations Center) where you will gain experience using fully licensed, enterprise-grade cybersecurity tools.

  • Tenable (Vulnerability Management)
  • Microsoft Sentinel (SIEM)
  • Microsoft Defender for Endpoint (EDR)
  • Microsoft Azure (For Your VMs)

Why Choose Our Community Platform?

Hands-On with Real Tools

Open “playground” style environment to experiment beyond the guided labs. Learn with industry-leading tools like Tenable, Microsoft Sentinel, and more. Courses on Cybersecurity Theory, Vulnerability Management, and Security Operations.

Internship Opportunities

Access exclusive internships and career resources to kickstart your cybersecurity career. Assist with security configurations, develop vulnerability remediations, and create SIEM/EDR Use Cases for the community.

Weekly Live Q&A

Get your questions answered by Josh and engage with the community in live sessions.Join an exclusive cybersecurity community of over 2,000 members.

Simulated Attack Scenarios

Respond to real-time threats from actual Internet bots attacking the infrastructure you control. Practice incident response against internal threats from Advanced Persistent Threat (APT) bots.

“Need experience to get experience?”
Welcome to the solution.

More Testimonials

Click on the name to see the actual image !

Cyber Range Breakdown

Cyber Theory

Hands-On Labs

Job Hunt

More detailed Course Curriculum

Interview estimonials

Derek-interview-thumbnail

From No Experience to Cybersecurity Management! Advance Your Career with a Practical Course

I had no experience in cybersecurity, but Josh's course helped me land a management position. This course provides practical skills, from crafting resumes to preparing for interviews. The support from the Discord community and using ChatGPT for research were key to my interview success. If you're considering a new career, this course is definitely worth it!

Edgar-interview-thumbnail

Career Change Success with a Hands-On Cybersecurity Course

I took Josh's cybersecurity course and landed a SOC analyst position in just two months, despite having no prior experience. The course is highly practical, packed with skills like Microsoft Sentinel queries and KQL that I could immediately apply on the job. Adding the course project to my resume greatly impressed interviewers. By revisiting the course material, I gained the confidence to speak fluently in interviews. This proven course is the perfect step to break into the cybersecurity industry!

Jordan-interview-thumbnail

Career Success as a Remote SOC Analyst: Jordan’s Real-Life Experience

With 5 years of IT experience, Jordan secured a remote SOC analyst position through Josh’s cybersecurity course. “The entire course was invaluable, especially in threat hunting and negotiation skills, which directly applied to my job,” he says. He found the foundational knowledge in networking and compliance particularly helpful, and the course helped him achieve the freedom of working remotely. Ready to elevate your career and work remotely? This course can help you take that next step.

Interview Testimonials

Josh Madakor began his IT career in 2007 as a help desk technician at a local community college. Over the years, he has gained experience in various disciplines including Software Development, System Engineering, and Cybersecurity. More recently, his roles in cybersecurity has allowed him to work with a diverse range of industries including local and state government, finance, defense contracting, as well as within the private sector as a contractor with Microsoft. At Microsoft, Josh has had the opportunity to assist with the development and maintenance of the Microsoft Cloud Security Benchmark.

In addition to his day job, Josh has been running a successful YouTube channel since 2020, focusing on IT, cybersecurity, education, and career development. His channel has helped hundreds, if not thousands, of viewers advance in their careers.

Graduate Success Stories

Ready to be our next success story?

Course Road Map

Cybersecurity Roadmap
1

Basic Skills

  • Build a strong foundation in cybersecurity with our General Theory Course.

2

Advanced Skill Development

  • Master vulnerability management techniques in the Vulnerability Management Course.
  • Learn hands-on cybersecurity defense strategies in the Security Operations Course.
3

Practical Experience and Job Support

  • Gain real-world experience through a hands-on cybersecurity internship.
  • Receive expert guidance to create high-quality job applications that stand out.
4

Join a Supportive Community

  • Stay engaged by connecting with peers while continuing your learning and practice.

5

Launch Your Cybersecurity Career

  • Apply your skills to secure your first job in cybersecurity.

We are offering a Cyber Range Community—a unique, virtual environment that simulates real-world networks and cyberattacks. This allows users to practice responding to cyber challenges in a safe and legal setting. Additionally, our infrastructure is exposed to the internet, meaning you will encounter real attacks that you can actively defend against. By joining, you’ll gain access to a Skool community, multiple courses, and enterprise-level cybersecurity tools. These resources provide hands-on experience in a shared cloud environment alongside other students. The courses cover Cybersecurity Theory, Vulnerability Management (both theory and practical application), and Security Operations/Threat Hunting. There are also courses designed to help you build your resume, create a portfolio, practice interviewing, and search for jobs. Additionally, an optional internship component is available for those who wish to participate. The community operates on a monthly subscription model that you can cancel at any time. However, even after cancellation, you’ll retain permanent access to the Cyber Range Alumni Discord server. This Cyber Range Community offers a comprehensive, immersive experience to build your cybersecurity skills.

The price of the community varies depending on two main factors: the cost of the infrastructure it runs on and the level of demand, as there is a maximum capacity of 1,000 members at a time. We cover the licensing expenses for Tenable (the Vulnerability Management platform) and all the cloud resources used in Azure, including Virtual Machines and Microsoft Defender for Endpoint.

In short, the price is variable, so the best way to get accurate information is to visit the community page: https://skool.com/cyber-range

All information is free, and it’s important to acknowledge that. However, when you join, here’s what you’re actually paying for:

– Access to a Cyber Range Environment that simulates a real work network, shared with other active users. The activity of these participants generates network traffic and logs that you can analyze.
– Access to enterprise-grade, licensed security tools, including Tenable Vulnerability Management, Microsoft Azure Compute, Microsoft Defender for Endpoint, and an EDR solution.
– Membership in a professional cybersecurity community with over 1,000 members.
– Access to a range of individual courses (cybersecurity theory, vulnerability management, security operations, threat hunting, and more) that I have carefully organized and built over time.
– The rights to list my company on your resume for experience if you choose to participate in the internship program.

Yes, you can. This community is specifically designed to address the main challenges people face when trying to secure a job, such as gaining hands-on experience in a real-world environment and acquiring verifiable experience that can be added to your resume under a company name. This community builds upon a previous course and internship program that has already helped several individuals land jobs.

You can see a list of past interns who have moved on to IT and cybersecurity-related positions here. Every person on this list had Log(N) Pacific (my company) listed as prior experience before securing employment: https://joshmadakor.tech/alumni

You will be working with the following:

– Cloud Platforms: Microsoft Azure, where you will manage virtual machines, network configurations, and cloud-based resources.
– Vulnerability Management: Access to enterprise-level tools such as Tenable – Vulnerability Management for scanning, assessing, and managing vulnerabilities in both Windows and Linux environments.
– Endpoint Detection and Response (EDR): Microsoft Defender for Endpoint, which you will use for onboarding, isolating, and investigating virtual machines, as well as detecting remote code execution.
– SIEM and Logging Tools: Microsoft Sentinel for creating and visualizing SIEM dashboards, monitoring network activity, and managing logs to identify potential security incidents.
– Threat Hunting and Security Operations: You’ll engage in threat hunting using scenarios that mimic real-world challenges, such as identifying network slowdowns, detecting data exfiltration, and responding to zero-day threats.
– Compliance and Auditing: Tools and processes for running compliance audits (e.g., CIS and DISA STIG) and applying security guidelines using PowerShell scripts.
– Programming and Automation: GitHub for building your portfolio and working on vulnerability management and security operations projects, showcasing your hands-on skills.
– Monitoring and Forensics: Utilizing Azure Activity Logs, NSG logs, and KQL (Kusto Query Language) to analyze audit logs, network security group logs, and – Microsoft Defender for Endpoint logs.
– Resume and Career Preparation: Support in building a professional portfolio and resume, along with practical interviewing skills and job search techniques.
– Internship Component: Optional activities to gain direct, real-world experience under the company’s name, which can be listed on your resume.

This blend of technologies ensures you build a robust set of skills in cybersecurity, including proactive threat response, vulnerability management, and security operations.

Yes, the experience is recognized. On average, I provide about one reference per week for companies looking to hire interns. You can view a list of past interns who have successfully transitioned into IT and cybersecurity roles here. Every individual on this list included Log(N) Pacific (my company) as prior experience before securing their positions: [https://joshmadakor.tech/alumni](https://joshmadakor.tech/alumni)

I’m not—the internship is simply an optional component within the community. It initially developed as a response to the high volume of questions and engagement from students. Since then, I’ve enhanced the internship experience by incorporating additional ways for members to contribute and gain experience. For full details, please visit https://joshmadakor.tech/internship.

During the internship, you’ll have the option to engage in various activities, including:

– Designing, testing, and publishing Threat Hunting Scenarios for use by other community members.
– Creating, testing, and publishing Vulnerability Remediations and STIG (Security Technical Implementation Guide) Implementations, which are standardized configurations used to enhance the security of systems.
– Providing general support within the Skool Cyber Range Community.
– Offering assistance in the Cyber Range Alumni Discord.

Your role and title will evolve based on your level of contribution, ranging from Cybersecurity Support Technician to Engineering.

Yes, absolutely. There is an entire section dedicated to providing resources and advice to help you build a strong foundation in cybersecurity. While the learning curve for someone completely new can be steep, it’s definitely manageable. Additionally, if you’re just starting out in the field, it’s highly encouraged to apply for both general IT positions and cybersecurity roles to increase your experience and opportunities.

All original course members were notified via email at the launch of the program and given the opportunity to join at a discounted rate. Once you join at this price, your rate will be locked in. Additionally, all original course members were granted access to the Cyber Range Alumni Discord, regardless of whether they choose to join the new community.

Frequently Asked Questions (FAQs)

Full Course Breakdown

The Cyber Range Community offers a comprehensive curriculum designed to take you from beginner to job-ready professional in IT and cybersecurity. Here’s what you’ll learn:

Cybersecurity Fundamentals

Gain a solid understanding of the CIA Triad (Confidentiality, Integrity, Availability) and foundational cybersecurity concepts. Perfect for those new to the field.

Vulnerability Management

Master vulnerability assessment and remediation using enterprise-grade tools like Tenable Vulnerability Management. Learn to scan, analyze, and secure systems with hands-on labs and projects.

Threat Hunting and Security Operations

Develop proactive security skills by identifying, analyzing, and mitigating threats. Use real-world tools like Microsoft Sentinel and Defender for Endpoint to detect anomalies, build SIEM dashboards, and practice incident response.

Security Tools and Automation

Work with cutting-edge enterprise tools:

  • Microsoft Azure for cloud-based resource management.
  • PowerShell scripting for automating security tasks like STIG (Security Technical Implementation Guide) compliance.
  • GitHub for building a portfolio showcasing your technical expertise.

Resume Building and Interview Preparation

Get tailored support to craft a standout resume, optimize your LinkedIn profile, and sharpen your interview skills. Learn to articulate your technical experience with confidence.

Optional Internship

Participate in a hands-on cybersecurity internship where you’ll:

  • Create threat hunting scenarios and reports.
  • Automate vulnerability management processes.
  • Assist community members with technical challenges.

Ongoing Community Support

Engage with a vibrant professional network on Skool, complete with regular live Q&A sessions, collaborative projects, and gamified learning to keep you motivated.

This curriculum is designed to provide real-world experience, enterprise-level expertise, and actionable career preparation to accelerate your path into IT or cybersecurity. Whether you’re just starting or looking to advance, this course equips you with the skills and confidence to succeed.