Hands-on simulations to practice cyber security concepts. Learn by doing with real-world scenarios.
Learn how SQL injection attacks work by exploiting a vulnerable login form. Understand query manipulation and how to prevent these attacks.
Step through the 7 stages of a cyber attack from reconnaissance to exfiltration. Learn MITRE ATT&CK techniques and security controls at each phase.
Analyze realistic phishing emails and identify red flags. Learn to spot spoofed senders, suspicious links, and urgency tactics used by attackers.
Interactive cloud architecture diagram showing attack paths from external hackers and insider threats. Explore WAF, encryption, and access controls.
Match malware types to their characteristics and behaviors. Learn to distinguish viruses, worms, ransomware, rootkits, and trojans.
Deep-dive, guided simulations of headline breaches and incidents.
Walk through the 2021 DarkSide ransomware attack that disrupted US fuel supplies. Make choices as the incident unfolds.
Relive the 2017 worm-driven ransomware pandemic that crippled the NHS. Explore EternalBlue, kill-switch, and mitigations.
Investigate how SUNBURST slipped into signed updates and reached 18,000+ orgs before detection. Practice strategic tradecraft.
Trace the Apache Struts (CVE-2017-5638) path to 147M records. Test decisions around patching, detection, and response.
Navigate realistic scenarios involving tailgating, pretexting, baiting, and vishing. Make decisions and see the consequences of your choices.