SCADA Cyber Range

6 hours, 30 minutes

The Labs

Train hands-on

  • Scada - Attacking the Infrastructure

    30 minutes
    Learn about compromising a system as you practice in the Scada Cyber Range.
  • Scada - CTF 1 - Reconnaissance

    30 minutes
    This lab is a Capture The Flag (CTF) style exercise that focuses on reconnaissance techniques. The lab is designed to teach participants about the importance of reconnaissance and how to conduct reconnaissance in a secure and ethical manner.
  • Scada - Datasheet Analysis

    30 minutes
    Explore getting valuable information from user manuals as you practice in the SCADA Cyber Range
  • Scada - Modbus PLC Introduction

    30 minutes
    In this lab, you will use Modbus protocol simulators to read and write settings to a PLC.
  • Scada - Scanning ICS/SCADA Networks

    Learn how to scan ICS/SCADA Network as you practice in the SCADA Cyber Range.
  • Scada - SNMP Reconnaissance

    30 minutes
    Learn about abusing SNMP as you practice in the SCADA Cyber Range.
  • Scada - Wi-Fi Password Cracking

    30 minutes
    This lab showcases a variety of techniques used to crack Wi-Fi Passwords.
  • Scada - CTF 2 - Sniffing

    20 minutes
    This lab is a Capture The Flag (CTF) style exercise that focuses on sniffing techniques. In this CTF, participants will practice gathering valuable information from captured network traffic.
  • Scada - Extracting Network Keys

    30 minutes
    This lab demonstrates how extracting network keys involves obtaining authentication information or cryptographic keys, posing risks or enhancing network security.
  • Scada - CTF 3 - Defense

    20 minutes
    This lab presents a Capture The Flag (CTF) style exercise, emphasizing defense techniques. Participants will have the opportunity to hone their skills in analyzing log files to observe and understand adversaries behavior.
  • Scada - Snort SCADA Rules

    30 minutes
    Learn how to practice Snort IDS and some rules created specifically for SCADA networks.
  • Scada - Firewall Rules for SCADA

    30 minutes
    In this lab, students will gain practical experience in utilizing iptables to effectively control network traffic, appreciate its versatility, and comprehend its crucial role in securing network infrastructures.
  • Scada - Exploiting OS-level Vulnerabilities

    30 minutes
    In this lab, the objective is to exploit the Shellshock vulnerability to alter files within the compromised environment.
  • Scada - Manipulating Protocol Data

    30 minutes
    Learn how to craft raw Modbus/TCP packets.
  • Scada - Honeypot

    20 minutes
    Learn to extract information about potential cyber attacks using the SCADA Honeypot.

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments