Unlike IT security, the main goal of OT security is not to protect data from being stolen, but to protect people and property by maintaining the safety and reliability of the physical process.

Launch real attacks against a variety of ICS/OT protocols and assets. Watch the consequences of the attacks in a 3D graphical simulation.

No setting up local networks and VMs, all you need is a browser. Access attacker and defender VMs with in-browser split screen and shared clipboards.
Download the course catalog to see the protocols, processes, and content we currently offer.
CourseList (pdf)
Download