We have designed a virtual training environment that allows the user to step through the quintessential phases of an attack: reconnaissance, scanning and enumeration, gaining access, maintaining access, and covering tracks. Licensed for reuse under Creative Commons, the materials can immediately be used for education and training purposes by attendees. We focus on what can be expected from the red team (attackers) and how that activity can potentially be mitigated by the blue team (defenders). Topics include social engineering, credential guessing, exploitation of vulnerable services, privilege escalation, and command line tips and tricks. Our environment features a “capture the flag” element, with various flags hidden throughout the victim box. It also features an interesting storyline that will be relevant to attendees.