Cyber Range
SCADA*
This cyber range helps you develop your knowledge of SCADA and Industrial Control System (ICS) security by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of SCADA security topics, including reconnaissance, scanning, honeypots, attacks and exploits. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new SCADA security skills.
The Labs
Train hands-on
Scada - Attacking the Infrastructure
Learn about compromising a system as you practice in the Scada Cyber Range.
Scada - CTF 1 - Reconnaissance
This lab is a Capture The Flag (CTF) style exercise that focuses on reconnaissance techniques. The lab is designed to teach participants about the importance of reconnaissance and how to conduct reconnaissance in a secure and ethical manner.
Scada - Datasheet Analysis
Explore getting valuable information from user manuals as you practice in the SCADA Cyber Range
Scada - Modbus PLC Introduction
In this lab, you will use Modbus protocol simulators to read and write settings to a PLC.
Scada - Scanning ICS/SCADA Networks
Learn how to scan ICS/SCADA Network as you practice in the SCADA Cyber Range.
Scada - SNMP Reconnaissance
Learn about abusing SNMP as you practice in the SCADA Cyber Range.
Scada - Wi-Fi Password Cracking
This lab showcases a variety of techniques used to crack Wi-Fi Passwords.
Scada - CTF 2 - Sniffing
This lab is a Capture The Flag (CTF) style exercise that focuses on sniffing techniques. In this CTF, participants will practice gathering valuable information from captured network traffic.
Scada - Extracting Network Keys
This lab demonstrates how extracting network keys involves obtaining authentication information or cryptographic keys, posing risks or enhancing network security.
Scada - CTF 3 - Defense
This lab presents a Capture The Flag (CTF) style exercise, emphasizing defense techniques. Participants will have the opportunity to hone their skills in analyzing log files to observe and understand adversaries behavior.
Scada - Snort SCADA Rules
Learn how to practice Snort IDS and some rules created specifically for SCADA networks.
Scada - Firewall Rules for SCADA
In this lab, students will gain practical experience in utilizing iptables to effectively control network traffic, appreciate its versatility, and comprehend its crucial role in securing network infrastructures.
Scada - Exploiting OS-level Vulnerabilities
In this lab, the objective is to exploit the Shellshock vulnerability to alter files within the compromised environment.
Scada - Manipulating Protocol Data
Learn how to craft raw Modbus/TCP packets.
Scada - Honeypot
Learn to extract information about potential cyber attacks using the SCADA Honeypot.
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments