// STEALTHBLUE CYBER TRAINING CATALOGUE
Precision-designed cybersecurity training for every role, every level, and every threat. Delivered by experienced STEALTHBLUE cyber operators.
Ransomware Attack on Regional Healthcare Provider — 6 Decision Points
A disgruntled employee with elevated access is exfiltrating sensitive financial data. Navigate the investigation, containment, and legal response.
A trusted vendor's software update has been compromised, delivering malware to your manufacturing control systems. Manage the supply chain crisis.
Attackers have compromised the CEO's email and are directing fraudulent wire transfers. Detect, contain, and recover from the BEC attack.
An unauthorized individual gained access to a server room and planted a rogue device on the network. Investigate the physical-cyber convergence.
Your organization operates critical energy infrastructure. A sophisticated nation-state actor has been detected in your network. Navigate the geopolitical and technical response.