Cyberbit website use cookies. By continuing to browse the site you are agreeing to our use of cookies. For more details about cookies and how to manage them, see our cookie policy. Continue

Rich Training Content for Any Cybersecurity Role

Cyberbit Range provides a wide selection of simulated training scenarios, from beginner level to advanced incident response scenarios. Scenarios are tailored for multiple roles in the organization, including incident responders, analysts, red teams, business executives and students. Industrial control attack scenarios are available for critical infrastructure attack simulation.

Incident Responder

Security Analyst

Forensics Expert

Penetration Tester

Business Executive

Malware Analyst

Firewall Admin

OT Security Manager

Modular Scenario Packs to Fit Your Needs

Our simulation content is packaged available as a modular set of packs, each one containing a set of simulated scenarios tailored to a training program. Whether your goal is training an incident response team, ramping up individual skills, or training ICS security experts, we have the rich content package that addresses your training needs.

Incident Response Pack

The incident response scenario pack includes a wide range of simulated attacks designed for up-skilling your SOC team and improving teamwork. Scenarios include ransomware attacks, SQL injection, DDoS, web defacement, and more.

Pentesting Pack

The Pentesting pack is intended for training red teams and penetration testers and includes various attack scenarios in an increasing level of difficulty.

ICS Security Pack

The ICS Security Pack provides scenarios for simulating attacks on critical infrastructure networks including IT to OT attacks. The pack includes OT environment components such as PLCs and HMIs.

Individual Skills Pack

The Individual Skills Pack allows the trainee to focus on improving personal skills such as mastering a specific security tool or an introductory attack scenario.

Training Scenarios Crafted by Training Experts

Training scenarios are tailored to improve essential cybersecurity skills, including detection, analysis, investigation, decision making, teamwork, remediation, and security tool operation. The simulated scenarios are designed by a team of cybersecurity training professionals.

Sample Training Scenario: Data Breach by SQL Injection

Download the Training Courses White Paper

Sample Courseware

Cyber Range Training for Critical Infrastructure Organizations

Industrial controls systems are increasingly threatened by cyberattacks. Regulation such as NERC, NIST and ISO require organizations to train their ICS security teams, but traditional IT training scenarios are inadequate. Cyberbit provides critical infrastructure organizations, education institutions and MSSPs with an ICS Range that provides the unique hardware and the specific training scenarios for OT attack scenarios.

photo

ICS/OT Attack Simulation Building Blocks

icon
ICS/OT Architecture
icon
ICS/OT Devices PLCs/RTUs/HMIs
icon
ICS/OT Protocols MODBUS/TCP, CIP, SITA
icon
ICS/OT attack scenarios port scanning, IT to OT attacks
image