- Engaging in a live cyberattack simulation tailored to generation-based infrastructure and technologies
- Experiencing real-time cyber threats and attack scenarios specific to generation environments
- Analyzing attack vectors and responding to cyber incidents in a simulated generation-based ICS environment