SCADA Cyber Range
6 hours, 30 minutes
The Labs
Train hands-on
-
Scada - Attacking the Infrastructure
30 minutesLearn about compromising a system as you practice in the Scada Cyber Range. -
Scada - CTF 1 - Reconnaissance
30 minutesThis lab is a Capture The Flag (CTF) style exercise that focuses on reconnaissance techniques. The lab is designed to teach participants about the importance of reconnaissance and how to conduct reconnaissance in a secure and ethical manner. -
Scada - Datasheet Analysis
30 minutesExplore getting valuable information from user manuals as you practice in the SCADA Cyber Range -
Scada - Modbus PLC Introduction
30 minutesIn this lab, you will use Modbus protocol simulators to read and write settings to a PLC. -
Scada - Scanning ICS/SCADA Networks
Learn how to scan ICS/SCADA Network as you practice in the SCADA Cyber Range. -
Scada - SNMP Reconnaissance
30 minutesLearn about abusing SNMP as you practice in the SCADA Cyber Range. -
Scada - Wi-Fi Password Cracking
30 minutesThis lab showcases a variety of techniques used to crack Wi-Fi Passwords. -
Scada - CTF 2 - Sniffing
20 minutesThis lab is a Capture The Flag (CTF) style exercise that focuses on sniffing techniques. In this CTF, participants will practice gathering valuable information from captured network traffic. -
Scada - Extracting Network Keys
30 minutesThis lab demonstrates how extracting network keys involves obtaining authentication information or cryptographic keys, posing risks or enhancing network security. -
Scada - CTF 3 - Defense
20 minutesThis lab presents a Capture The Flag (CTF) style exercise, emphasizing defense techniques. Participants will have the opportunity to hone their skills in analyzing log files to observe and understand adversaries behavior. -
Scada - Snort SCADA Rules
30 minutesLearn how to practice Snort IDS and some rules created specifically for SCADA networks. -
Scada - Firewall Rules for SCADA
30 minutesIn this lab, students will gain practical experience in utilizing iptables to effectively control network traffic, appreciate its versatility, and comprehend its crucial role in securing network infrastructures. -
Scada - Exploiting OS-level Vulnerabilities
30 minutesIn this lab, the objective is to exploit the Shellshock vulnerability to alter files within the compromised environment. -
Scada - Manipulating Protocol Data
30 minutesLearn how to craft raw Modbus/TCP packets. -
Scada - Honeypot
20 minutesLearn to extract information about potential cyber attacks using the SCADA Honeypot.
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments