Master industrial deception from PLC honeypots to fully interactive OT networks — practical, hands-on, engineered for real defenders
What You Get:
✅ 2.5+ hours of expert video instruction
✅ 10+ hands-on OT deception labs
✅ Certificate of Completion
✅ Access to private OT security community
✅ Open-source virtual lab setup (yours to keep)
✅ 30-Day Money-Back Guarantee

"In this training, I’ll teach you how to design and deploy OT deception the way attackers actually experience it — practical, realistic, and free of marketing noise."
Yes - You should have basic familiarity with industrial networks and previous exposure to offensive security concepts. If you’ve completed POISE — or similar practical training — you’re perfectly prepared.
No. All labs are based on open-source virtual environments.
You have 30 days to try it out. If it’s not for you, I'll refund you in full.
Payment is securely handled via Stripe (for credit/debit cards) and PayPal. Both options are fully supported. For convenience and ease of use, I personally recommend PayPal — especially if you already have an account set up.
You’ll need a Windows 10 or Windows 11 machine with admin rights to install software. The practical labs run inside Oracle VirtualBox, so your machine should support virtualization. Minimum: 8 GB of RAM Recommended: 16 GB of RAM for smooth performance A stable internet connection is also recommended to stream the videos and download lab resources
Not necessarily — but being comfortable with typing commands will definitely help. This training relies heavily on using the command line. However: All commands are shown clearly in the videos, so you can follow along step by step. What matters most is curiosity and the ability to look things up when something is unfamiliar.
"Well laid out, detailed with practical examples and exercises, bridging the gap between theory and practical. I would highly recommend this training."
Rohan V. ⭐⭐⭐⭐
Alumni on PICSPT
"Training was put together well and identified all of the necessary tools. Hits close to home as one of the devices shown was only a few miles away from where I live. Hopefully they have fixed that since the data was collected eight years ago."
Michael E. ⭐⭐⭐⭐
Alumni on PICSPT
"I believe industrial security knowledge should be accessible and tangible"
Marcel Rick-Cen
Instructor