sports_esports Cyber Range Training

The only way to be ready
is to have already been there.

Tabletop exercises and certification courses tell your team what to do. The SPS Cyber Range shows them how it feels to do it — under pressure, against real adversary techniques, in an environment that looks exactly like your own. We don't believe in generic training. We build the range around your infrastructure, your threat actors, and your team's actual gaps.

50+
Scenario templates
1,200+
Analysts trained
8
CTF events per year
60%
Faster response post-training
analyst-03@range.spsnet.com
[09:14:22] Range environment initialized
Target: county-dc01.range.local
Scenario: APT29 Initial Access Simulation
[09:14:28] Adversary VM deployed...
[09:14:34] ✓ All systems ready — begin
Alert: Spear phish delivered to target
[09:14:51] Analyst investigating...
root@analyst-03:~$
Live Session Progress APT29 — Initial Access
ReconInitial AccessPersistenceExfil
Custom Environments

Tailored to your organization's ecosystem

Generic training teaches people how to use tools they don't recognize in environments that look nothing like their own. Our engineers clone your actual technology stack — including legacy systems, specific SaaS integrations, and known infrastructure quirks — to create a mirror-world simulation. When analysts train in something that looks exactly like what they defend, their skills transfer the moment they walk back through the door.

  • content_copyDeploy a pixel-perfect replica of your AWS, Azure, or on-premise architecture within 48 hours
  • settings_suggestCustom scenario development based on the threat actors actually targeting your sector
  • historyLegacy stack support — even the oldest hardware can be virtualized
  • tuneDynamic difficulty scaling — start with script-kiddie noise, escalate to nation-state APT techniques
0.05ms
Replication latency

Our infrastructure emulation is indistinguishable from production to the training participants — that's the point.

account_tree

Infrastructure Twin

Deploy a fully functional replica of your environment. Your network topology, your SIEM rules, your Active Directory structure, your cloud configuration — exact. Analysts train on what they'll actually face.

Cloud NativeHybrid Ready
bug_report

Custom Malware Injection

Test defenses against proprietary exploits and zero-day signatures tailored to your specific industry vertical and technology stack. Not the same generic Metasploit modules every other range uses.

low_priority

Legacy Stack Support

Government agencies and healthcare organizations running decade-old systems can still train in an accurate replica. Our virtualization team handles the edge cases others walk away from.

sync_alt

Dynamic Scenario Scaling

Adjust adversary difficulty in real time. Begin with commodity attacks to build foundational skills, then escalate to sophisticated multi-stage APT campaigns as proficiency improves.

Red vs Blue

The Adversarial Balance

Master both sides of the coin. Forge elite defenders through the experience of attacking and elite attackers through the discipline of defending. In a controlled arena, both sides win — because both sides learn.

Defensive Doctrine

Blue Team — Defend

shield
Incident Response Orchestration

Work through real attacks from detection to containment in real time. No scripted outcomes — the attacker adapts to your response, just as they would in a real breach.

troubleshoot
Advanced Threat Hunting

Identify anomalous behavior in petabytes of synthetic traffic data. Build the proactive hunting skills that distinguish a mature SOC from one that waits for alerts.

verified
MYID Self Verify Integration Training

Train specifically with MYID Self Verify in the loop — practice the full identity threat response workflow including biometric verification, Autopilot activation, and SOC offense closure.

Offensive Doctrine

Red Team — Attack

close
Stealth Exfiltration Routes

Master the art of moving data without triggering SIEM alerts. Understand exactly why your defenders are looking in the wrong places and how real attackers exploit that gap.

phishing
Social Engineering Simulation

Test the human perimeter using AI-generated phishing payloads calibrated to your organization's communication style. Understand why your awareness training isn't working.

key
Active Directory Attack Chains

Kerberoasting, Golden Ticket, DCSync, LAPS abuse — practice the techniques that compromise 70% of enterprise environments against a live AD environment before you face them for real.

Training Programs

Structured learning paths for every career stage

Whether you're building a first-year SOC analyst or preparing a CISO for a board-level breach simulation — there's a structured program designed for where your team is now and where they need to be.

Foundational · 5 Days

SOC Analyst Foundations

For aspiring and junior SOC analysts who need practical skills, not just theoretical knowledge. Covers SIEM navigation across QRadar, Splunk, and Sentinel; alert triage and false positive reduction; incident documentation; and an introduction to proactive threat hunting with MITRE ATT&CK as the framework. 20+ hands-on scenario exercises.

  • checkSIEM navigation and log analysis fundamentals
  • checkAlert triage and escalation procedures
  • checkIncident documentation and chain of custody
  • checkIntroduction to MITRE ATT&CK framework
  • check20+ hands-on range exercises
Max 16 participants · Certificate awarded · Government billing codes accepted
Enquire →
Advanced · 10 Days

Ethical Hacking Practitioner

For security professionals ready to make the transition to offensive security roles. Practical exploitation using industry-standard tools, Active Directory attack chains, web application vulnerability exploitation, and report writing that non-technical stakeholders can actually understand. CTF challenges are integrated throughout the program to reinforce skills with real stakes.

  • checkReconnaissance and OSINT methodology
  • checkExploitation frameworks and technique library
  • checkActive Directory attack chains
  • checkWeb application and mobile vulnerability exploitation
  • checkClient-ready report writing
  • checkCTF challenges throughout program
Max 10 participants · ECEH certificate · OSCP preparation pathway
Enquire →
Executive Program

CISO Tabletop Exercise Facilitation

Half-day or full-day exercises for C-suite, board members, and crisis management teams. We walk your leadership through realistic breach scenarios — ransomware demanding payment, regulatory notification deadlines, media inquiries — to test decision-making under pressure before it counts. Facilitated by former CISOs and incident command veterans who've lived through the real thing.

  • checkCustom scenario built around your sector and threat profile
  • checkFacilitated by former CISOs and crisis veterans
  • checkAfter-action report with gap analysis and recommendations
  • checkDocumentation suitable for cyber insurance and compliance
Request Facilitation →
CTF Competitions

Test your mettle against the best in the region

8 CTF competitions per year — quarterly open events for individual practitioners and private corporate editions for enterprise teams. All challenges are built from real-world attack scenarios, not theoretical puzzles, and structured around MITRE ATT&CK so participants leave having learned defense principles alongside offensive techniques.

emoji_events

Open CTF

Quarterly competitions open globally. Web, forensics, reverse engineering, crypto, and network challenges.

business

Corporate CTF

Private events hosted exclusively for client organizations. Custom scenarios built around your industry threat profile.

school

University Track

Annual university competition with scholarships and SPS internship opportunities for top performers.

groups

Red vs Blue Live

Bi-annual live-fire competitions where red and blue teams compete in real time against each other using production security tooling.

Register for Next CTF
Next Open CTF — Dates TBA
Register below to be notified when the next competition is announced.
Q1 2025 Leaderboard
Open CTF — Final Standings
Closed
🥇
ShadowHex
Individual · UAE
4,750
🥈
CipherForce
Team · Virginia, USA
4,180
🥉
RootKit0x7
Individual · Region Undisclosed
3,900
4
ByteBreakers
Team · Maryland, USA
3,620
5
DFIR_Queen
Individual · Jordan
3,270

Simulated standings for illustration. Register to compete in real events.

Enterprise Licensing

Your own dedicated range.
Your team. Your scenarios.

License a dedicated, isolated range environment pre-loaded with your technology stack. Unlimited seat access, custom scenario development, and quarterly content refreshes based on current threat intelligence. Your security team can run exercises on demand without scheduling or sharing infrastructure.

  • check_circleDedicated infrastructure — no shared environment, no scheduling conflicts
  • check_circleMirror of your actual production technology stack
  • check_circleCustom scenario development against your specific threat actors
  • check_circleQuarterly content refresh with new TTP coverage
  • check_circleGovernment procurement frameworks supported
Request Enterprise Proposal →
72%
Reduction in mean time to respond after 3-month training program
94%
Of range-trained analysts outperform peers in live incident assessments
3x
Faster incident containment in organizations with regular cyber range training
$0
Production risk during training — fully isolated, fully safe