Training Scenarios
Industrial Control Systems
Dive into real-world ICS challenges with hands-on training scenarios designed to teach critical cybersecurity skills. Each scenario ransomware on a power grid, SSH attack on a vulnerable Linux server, and a sensitive data breach helps players understand, analyze, and defend against threats in industrial environments.
To download and print the ICS training scenarios for in-person use, click the ICS Scenarios button bellow. Each scenario includes setup instructions, objectives, and learning outcomes to bring your training sessions to life.
Enhance your gameplay and training with dynamic Attack and Defense Diagrams for each scenario. These visuals break down how real-world cyberattacks unfold step-by-step using the Cyber Kill Chain, and show how each card plays a role in building or blocking an attack. Click the Attacker button to download the Attack Chain Diagram, showing how threats escalate. Click the Defender button to download the Defense Diagram, highlighting how to detect, respond, and recover at each phase.
These diagrams are perfect for quick reference during gameplay, in-class training, or strategy planning.

Ransomware
This is a Paragraph. Click on "Edit Text" or double click on the text box to start editing the content and make sure to add any relevant details or information that you want to share with your visitors.
SSH Attack
This is a Paragraph. Click on "Edit Text" or double click on the text box to start editing the content and make sure to add any relevant details or information that you want to share with your visitors.


Data Breach
This is a Paragraph. Click on "Edit Text" or double click on the text box to start editing the content and make sure to add any relevant details or information that you want to share with your visitors.