This hands-on training walks participants through a complete IT-to-OT red team scenario, following a realistic attack path from initial compromise of an IT environment, through Active Directory exploitation and lateral movement, and into OT networks.
Participants will interact with SCADA systems and PLCs to demonstrate real operational impact, while also examining where detection, segmentation, and security controls succeed or fail. The course places equal emphasis on offensive execution and defensive understanding.
