Attacking the Infrastructure
Learn about compromising a system as you practice in the SCADA Cyber Range.
Cyber Range
This cyber range helps you develop your knowledge of SCADA and Industrial Control System (ICS) security by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of SCADA security topics, including reconnaissance, scanning, honeypots, attacks and exploits. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new SCADA security skills.
The labs
Attacking the Infrastructure
Learn about compromising a system as you practice in the SCADA Cyber Range.
Snort SCADA Rules
Learn about Snort SCADA rules as you practice in the SCADA Cyber Range.
Wi-Fi Password Cracking
Learn about cracking Wi-Fi passwords as you practice in the SCADA Cyber Range.
SNMP Reconnaissance
Learn about abusing SNMP as you practice in the SCADA Cyber Range.
Exploiting OS-Level Vulnerabilities
Learn about Shellshock exploitation on a host system as you practice in the SCADA Cyber Range.
Datasheet Analysis
Explore getting valuable information from user manuals as you practice in the SCADA Cyber Range.
Extracting Network Keys
Test your skills with exploiting ZigBee and encryption cracking as you practice in the SCADA Cyber Range.
Firewall Rules for SCADA
Get insight into SCADA firewall rules as you practice in the SCADA Cyber Range.
SCADA Honeypot
Explore the SCADA honeypot Conpot as you practice in the SCADA Cyber Range.
CTF 1
Test your reconnaissance skills as you practice in the SCADA Cyber Range.
CTF 2
Test your sniffing skills as you practice in the SCADA Cyber Range.
CTF 3
Test your SCADA defense skills as you practice in the SCADA Cyber Range.
Modbus PLC Introduction
Get an introduction to Modbus and gain hands-on experience via the SCADA Cyber Range.
Manipulating Protocol Data
Learn about manipulating protocol data as you practice in the SCADA Cyber Range.
Scanning ICS/SCADA Networks
Learn about scanning SCADA networks as you practice in the SCADA Cyber Range.
We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.
Caleb Yankus
This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.
Daniel Simpson
We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.
Infosec Skills Teams client