Effective scenario-based training must use the same methodologies employed by a hostile attacker. Physical intrusion into the premises with remote social engineering attacks like spear phishing email and USB keys left on-site. “Obvious” attacks to distract from more stealthy attacks, and when compromise is achieved, employ stealth and other activities to remain on the network.
Contact us for more information and to see how we can provide you with a solution to meet your needs.