8-bit video game blocks with pixel art of the Learn One and Learn Enterprise logos

Level up your training with limited-time offers - Discounts for Individuals and Enterprise

World-renowned, hands-on cybersecurity training supporting the NICE Framework

Training for 14 job roles

OffSec hands-on training content covers over 70% of the tasks, knowledge, and skills (TKS) required to match 14 different job roles. OffSec training empowers leaders to:

  • Identify skill gaps based on current training achievements

  • Develop training plans for new and existing employees

  • Achieve compliance goals by identifying skills proficiencies

Hero image for World-renowned, hands-on cybersecurity training supporting the NICE Framework

NICE Tasks, Knowledge & Skills

  • These TKS's act as building blocks that are needed to perform cybersecurity work by individuals or teams.
  • Through these building blocks, the NICE Framework enables organizations to develop their cybersecurity workforces and helps learners explore cybersecurity work and engage in learning activities to develop their capabilities.

OffSec training for 14 NICE job roles

Offensive Security

Research & Development Specialist

Conducts software and systems engineering and software systems research in order to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.

Security Control Assessor

Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.

Cyberspace Operator

Leverages a wide range of software applications for network navigation, tactical forensic analysis, surveillance and reconnaissance, and executing on-net operations in support of offensive cyberspace operations when directed.

Exploration Analyst

Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

Defensive Security

Cyber Defense Analyst

Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.

Cyber Defense Forensics Analyst

Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.

Cyber Defense Incident Responder

Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.

Cyber Defense Infrastructure Support Specialist

Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.

Vulnerability Assessment Analyst

Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.

Forensics Analyst

Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.

Secure Development

Secure Software Assessor

Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.

Systems Security Analyst

Responsible for analysis and development of systems/software security through the product lifecycle to include integration, testing, operations and maintenance.

IT Team Cybersecurity

System Administrator

Installs, configures, troubleshoots, and maintains hardware, software, and administers system accounts.

Host Analyst

Conducts analysis, using built-in tools, of various system configurations encountered (file systems, permissions, and configurations).

Achieve regulatory compliance

Leveraging industry-standard frameworks, cybersecurity teams can identify risk areas across their organizations. Those same techniques are mapped to the learning paths from OffSec ensuring teams get proper training to meet compliance requirements for cybersecurity training.

Assess & train cybersecurity teams

Use the industry frameworks to identify skill gaps across teams. Pick the OffSec Learning Paths that focus on desirable skills. Addressing critical techniques, these learning paths provide teams with text-based training and reinforce training with real-world, hands-on labs.

Why train your team with OffSec?

Best alignment with industry frameworks

Gain an attacker's edge with the right mindset

Develop stronger skills with hands-on training

Start learning with OffSec

All
access

Learn
Unlimited

$5,799/year*

Unlimited OffSec Learning Library access plus unlimited exam attempts for one year.

undefined
Large teams

Learn
Enterprise

Get a quote

Flexible terms and volume discounts available.

Contact us

FAQ

  • What is the NICE framework?

    The NICE Framework establishes a common language that describes cybersecurity work and the knowledge and skills needed to complete that work. It is used in public and private sectors and across industries for career discovery, education and training, and in hiring and workforce development.

  • What current public sector organizations use OffSec for training?

    We are used by state, local, federal and international government organizations to train their cybersecurity teams. Some of our featured public sector customers are listed here.

  • Does OffSec have a Cyber Range?

    Yes, and Learn Enterprise customers get access to the Enterprise Cyber Range. Train teams in offensive and defensive cyber ranges. Set up tournaments and track progress with leaderboards in Versus. Understand skill gaps, build training plans & measure learner growth.