A computer-implemented method, computer program product and computing system including defining a training routine for a specific attack of a computing platform. A simulation of the specific attack may be generated by executing the training routine within a controlled test environment. A trainee may be allowed to view the simulation of the specific attack, wherein the trainee is an individual.