Cyber Range


This cyber range helps you develop your knowledge of SCADA and Industrial Control System (ICS) security by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of SCADA security topics, including reconnaissance, scanning, honeypots, attacks and exploits. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new SCADA security skills.
6 hours, 30 minutes

The Labs

Train hands-on

Scada - Attacking the Infrastructure

Learn about compromising a system as you practice in the Scada Cyber Range.

Scada - CTF 1 - Reconnaissance

This lab is a Capture The Flag (CTF) style exercise that focuses on reconnaissance techniques. The lab is designed to teach participants about the importance of reconnaissance and how to conduct reconnaissance in a secure and ethical manner.

Scada - Datasheet Analysis

Explore getting valuable information from user manuals as you practice in the SCADA Cyber Range

Scada - Modbus PLC Introduction

In this lab, you will use Modbus protocol simulators to read and write settings to a PLC.

Scada - Scanning ICS/SCADA Networks

Learn how to scan ICS/SCADA Network as you practice in the SCADA Cyber Range.

Scada - SNMP Reconnaissance

Learn about abusing SNMP as you practice in the SCADA Cyber Range.

Scada - Wi-Fi Password Cracking

This lab showcases a variety of techniques used to crack Wi-Fi Passwords.

Scada - CTF 2 - Sniffing

This lab is a Capture The Flag (CTF) style exercise that focuses on sniffing techniques. In this CTF, participants will practice gathering valuable information from captured network traffic.

Scada - Extracting Network Keys

This lab demonstrates how extracting network keys involves obtaining authentication information or cryptographic keys, posing risks or enhancing network security.

Scada - CTF 3 - Defense

This lab presents a Capture The Flag (CTF) style exercise, emphasizing defense techniques. Participants will have the opportunity to hone their skills in analyzing log files to observe and understand adversaries behavior.

Scada - Snort SCADA Rules

Learn how to practice Snort IDS and some rules created specifically for SCADA networks.

Scada - Firewall Rules for SCADA

In this lab, students will gain practical experience in utilizing iptables to effectively control network traffic, appreciate its versatility, and comprehend its crucial role in securing network infrastructures.

Scada - Exploiting OS-level Vulnerabilities

In this lab, the objective is to exploit the Shellshock vulnerability to alter files within the compromised environment.

Scada - Manipulating Protocol Data

Learn how to craft raw Modbus/TCP packets.

Scada - Honeypot

Learn to extract information about potential cyber attacks using the SCADA Honeypot.

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments