The SPS Cyber Range is a fully isolated, realistic environment where security teams develop and sharpen their skills against real adversarial techniques — without risk to production systems. Train your SOC analysts, incident responders, and ethical hackers in scenarios drawn from actual threat intelligence.
Scenario Library
All scenarios are built from real threat intelligence and updated as the threat landscape evolves.
Replicate the full APT29 kill chain: spear phishing with malicious document, LSASS credential dumping, Golden Ticket attack, lateral movement to domain controller, and exfiltration.
Respond to an active LockBit encryption event. Triage, containment, eradication, recovery, and post-incident review under time pressure while preserving forensic evidence.
Exploit a vulnerable banking web application using SQL injection, authentication bypass, IDOR, and SSRF to access the internal payment API. Then switch sides and defend.
Discover exposed AWS credentials in a public S3 bucket, escalate IAM privileges, pivot to Lambda functions, and exfiltrate RDS database contents — then remediate and harden.
Perfect for new SOC analysts. Work through 20 simulated SIEM alerts covering common attack patterns, false positive identification, and proper escalation procedures.
Based on real ICS/SCADA attack patterns from documented energy sector incidents. IT to OT pivot, PLC manipulation, and emergency incident response in an isolated power grid simulation.
Training Programs
From first-year SOC analyst to CISO-level tabletop facilitation — structured programs for every stage of your security career.
Comprehensive 5-day program for aspiring and junior SOC analysts. Covers SIEM fundamentals, alert triage, incident classification, and basic threat hunting.
7-day deep-dive into digital forensics and incident response. Trainees respond to multiple full-scale simulated incidents across the range environment.
Hands-on offensive security program for security professionals transitioning to red team roles. Practical exploitation in the range with guided methodology.
Half-day or full-day facilitated exercises for leadership teams. Walk your board, C-suite, and crisis response team through realistic breach scenarios to test decision-making, communication protocols, and recovery plans.
Competitions
SPS hosts 8 CTF competitions per year — open competitions for individual practitioners and corporate team events for enterprise clients. All challenges are custom-built from real attack scenarios and structured around the MITRE ATT&CK framework.
Quarterly competitions open to individuals and teams globally. Challenges across web, forensics, reverse engineering, crypto, and network.
Private CTF events hosted exclusively for enterprise clients. Custom scenarios built around your industry vertical and threat profile.
Annual university cybersecurity competition with scholarships and SPS internship opportunities for top performers.
Bi-annual live-fire red vs blue team competitions. Attackers attempt to breach; defenders monitor and respond in real time using production SIEM tools.
Top Performers
Simulated for illustration. Register to participate in real competitions.
48-hour competition. 200+ participants from 30+ countries. $15,000 prize pool.
Register Now →Enterprise clients can license a dedicated, isolated cyber range environment pre-loaded with your technology stack and customized scenarios built around your specific threat profile. Unlimited usage for your security team, integrated with your existing SOC tooling.