ThreatGEN: Red vs. Blue for linux

How to Download ThreatGEN: Red vs. Blue

Written by Derezzed

Table of Contents:
1. Screenshots
2. Installing on Windows Pc
3. Installing on Linux
4. System Requirements
5. Game features
6. Reviews

ThreatGEN: Red vs. Blue Screenshots

    ThreatGEN: Red vs. Blue game for Linux 1 ThreatGEN: Red vs. Blue game for windows Pc 1 ThreatGEN: Red vs. Bluefor windows and Linux 1

How to Install ThreatGEN: Red vs. Blue on Windows Pc

  1. Click on the ThreatGEN: Red vs. Blue download button below.
  2. Choose "Install" to install the game on the windows steam client.
  3. Follow the on-screen prompts
  4. Let it download the Full Version.
  5. Once a game is downloaded, use the Windows Steam Client to play the game.

=== Download Game ====


Download for pc →

Guide: Installing ThreatGEN: Red vs. Blue on Linux with Steam Proton

This guide describes how to use Steam Proton to play and run Windows games on your Linux computer. Some games may not work or may break because Steam Proton is still at a very early stage.


1. Activating Steam Proton for Linux:
Proton is integrated into the Steam Client with "Steam Play." To activate proton, go into your steam client and click on Steam in the upper right corner. Then click on settings to open a new window. From here, click on the Steam Play button at the bottom of the panel. Click "Enable Steam Play for Supported Titles."

Alternatively: Go to Steam > Settings > Steam Play and turn on the "Enable Steam Play for Supported Titles" option.

Valve has tested and fixed some Steam titles and you will now be able to play most of them. However, if you want to go further and play titles that even Valve hasn't tested, toggle the "Enable Steam Play for all titles" option.


2. Choose a version
You should use the Steam Proton version recommended by Steam: 3.7-8. This is the most stable version of Steam Proton at the moment.


3. Restart your Steam
After you have successfully activated Steam Proton, click "OK" and Steam will ask you to restart it for the changes to take effect. Restart it. Your computer will now play all of steam's whitelisted games seamlessly.


4. Launch Stardew Valley on Linux:
Before you can use Steam Proton, you must first download the Stardew Valley Windows game from Steam. When you download Stardew Valley for the first time, you will notice that the download size is slightly larger than the size of the game.
This happens because Steam will download your chosen Steam Proton version with this game as well. After the download is complete, simply click the "Play" button.


System Requirements

Windows Pc Requirements

Minimum:
  • Requires a 64-bit processor and operating system
  • OS: Windows 7 or better
  • Processor: Intel Core i3 64-bit 1.5 GHz CPU or better
  • Memory: 4 GB RAM
  • Graphics: Standard onboard graphics
  • Storage: 1 GB available space
  • Sound Card: Standard onboard sound

Recommended:
  • Requires a 64-bit processor and operating system

Linux Requirements

Minimum:
  • Requires a 64-bit processor and operating system
  • OS: Any RPM-based or Debian-based variant
  • Processor: Intel Core i3 64-bit 1.5 GHz CPU or better
  • Memory: 4 GB RAM
  • Graphics: Standard onboard graphics
  • Storage: 1 GB available space
  • Sound Card: Standard onboard sound

Recommended:
  • Requires a 64-bit processor and operating system

Mac Requirements

Minimum:
  • Requires a 64-bit processor and operating system
  • OS: OS X 10.10 Yosemite or better
  • Processor: Intel Core i3 64-bit 1.5 GHz CPU or better
  • Memory: 4 GB RAM
  • Graphics: Standard onboard graphics
  • Storage: 1 GB available space
  • Sound Card: Standard onboard sound

Recommended:
  • Requires a 64-bit processor and operating system

What is ThreatGEN: Red vs. Blue? Features and Description

ThreatGEN: Red vs. Blue is a cyber warfare turn-based strategy game that is also designed to actually teach you real-world cybersecurity concepts, methods, strategies, and skills.

It's Cyber Warfare... Turn-Based Strategy Style

Which side will you choose? The hackers (red team) or the cyber defenders (blue team)? Battle head to head in turn-based cyber warfare, where the fate of a company's computers, network, information, and even critical industrial control systems hang in the balance.


But ThreatGEN: Red vs. Blue is not just a game...

Learn Real-World Cybersecurity!

Developed by actual experienced, professional (ethical) "hackers" and penetration testers, ThreatGEN: Red vs. Blue is also designed to teach you real-world cybersecurity! Learn how hackers think, operate, and attack systems by playing the part of the red team (no prior skills necessary)! Play the part of the blue team and learn about real cybersecurity controls, technology, methods, and strategies!

Game Play

ThreatGEN: Red vs. Blue is a turn-based strategy game played much like popular global domination board games. Rather than a world map, the "game board" consists of a computer network, which players compete for control over. Instead of simulated computer terminals, players choose and commit actions using "action cards" similar to a trading card game.

By the Community... For the Community

Every single member of the development team for this game actually comes from the cybersecurity (or INFOSEC) community. Most of us work, or have worked, for years as cybersecurity professionals, and we all remain active members of the community. Developers Clint Bodungen and Aaron Shbeeb are authors of the book, Hacking Exposed: Industrial Control Systems. ThreatGEN: Red vs. Blue was developed and tested as a result of the feedback from more than 300 beta testers in the cybersecurity community. Our goal is to continue to make regular updates based on continued feedback, making this truly a game by the community, for the community.

Features

  • 1-on-1 internet and local hot seat (shared screen) multiplayer
  • Cross-platform multiplayer enabled
  • Touch screen optimized
  • In-game real-world cybersecurity advice and hints
  • Configurable win conditions
  • Game "Wiki" with game play concepts and instructions, as well as real-world cybersecurity definitions and concepts

User Reviews

No reviews yet!!

keyboard_arrow_up