ThreatGEN: Red vs. Blue

Genres:
Publisher:
Developer:
Add to My Games
Add to Wishlist

About

It's Cyber Warfare... Turn-Based Strategy StyleWhich side will you choose? The hackers (red team) or the cyber defenders (blue team)? Battle head to head in turn-based cyber warfare, where the fate of a company's computers, network, information, and even critical industrial control systems (ICS) hang in the balance.


But ThreatGEN: Red vs. Blue is not just a game...Learn Real-World Cybersecurity!Developed by actual experienced, professional (ethical) "hackers" and penetration testers, ThreatGEN: Red vs. Blue is also designed to teach you real-world cybersecurity! Learn how hackers think, operate, and attack systems by playing the part of the red team (no prior skills necessary)! Play the part of the blue team and learn about real cybersecurity controls, technology, methods, and strategies!Game PlayThreatGEN: Red vs. Blue is a turn-based strategy game played much like popular global domination board games. Rather than a world map, the "game board" consists of a computer network, which players compete for control over. No technical skill is required to play. Instead of simulated computer terminals and computer code, players choose and commit actions using the action menu, similar to a skill tree used in many other computer and console games.By the Community... For the CommunityEvery single member of the development team for this game actually comes from the cybersecurity (or INFOSEC) community. Most of us work, or have worked, for years as cybersecurity professionals, and we all remain active members of the community. Developers Clint Bodungen and Aaron Shbeeb are authors of the book, Hacking Exposed: Industrial Control Systems. ThreatGEN: Red vs. Blue was developed and tested as a result of the feedback from more than 300 beta testers in the cybersecurity community. Our goal is to continue to make regular updates based on continued feedback, making this truly a game by the community, for the community.Features
  • 1-on-1 internet and local hot seat (shared screen) multiplayer
  • Cross-platform multiplayer enabled
  • Touch screen optimized
  • In-game real-world cybersecurity advice and hints
  • Configurable settings
  • Game "Wiki" with game play concepts and instructions, as well as real-world cybersecurity definitions and concepts