SYSTEM ONLINE XP: 0 00:00
// INTERACTIVE LAB ACTIVITY //

INTO THE BREACH

Week 1 — Introduction to Cybersecurity. This lab puts you in the seat of both attacker and defender. Learn by doing.

LAB PROGRESS 0 / 5 MODULES
01 // CIA TRIAD
02 // THREAT TYPES
03 // ATTACK PHASES
04 // DEFENDER MODE
05 // BUILD DEFENSES
🔐

MODULE 01 — THE CIA TRIAD

Every security decision revolves around three core principles. Click each pillar to explore, then classify real-world scenarios to test your understanding.

// OBJECTIVE: Identify which CIA principle is violated in each breach scenario

// Explore the CIA Triad

Click each pillar to learn what it means and why it matters.

🔒
C
CONFIDENTIALITY
I
INTEGRITY
A
AVAILABILITY

// SELECT A PILLAR ABOVE

Click Confidentiality, Integrity, or Availability to explore each concept in depth.

// Scenario Classifier — Breach Analysis

Read each breach scenario. Click which CIA principle is MOST violated. Complete all 5 to proceed.

☠️

MODULE 02 — THREAT LANDSCAPE

Cybersecurity threats come in many forms. Expand each threat type to study how it works, then explore real-world examples.

// OBJECTIVE: Explore all 6 threat categories and identify their real-world examples

// Threat Intelligence Database — Expand Each Entry

Click any threat card to reveal detailed mechanics, attack steps, and documented real-world incidents.

Threats Explored: 0 / 6
⚔️

MODULE 03 — THE ATTACK LIFECYCLE

Attacks don't happen instantly. They follow a predictable sequence called the Cyber Kill Chain. Step through a live simulated attack to understand each phase.

// OBJECTIVE: Execute all 5 attack phases in sequence to complete the simulation

// Simulated Attack Console — "Operation: Shadow Breach"

You are simulating the perspective of a threat actor targeting a fictional company. Execute each phase in order to understand how attacks unfold.

01RECON
02WEAPONIZE
03DELIVER
04EXPLOIT
05PERSIST
SHADOW_BREACH_SIM v1.0 — EDUCATIONAL MODE
╔═══════════════════════════════════════════════════════╗ ║ SHADOW BREACH SIMULATION — EDUCATIONAL ENVIRONMENT ║ ╚═══════════════════════════════════════════════════════╝ Target: ACME_Corp_Network [SIMULATED] Mode: Educational — No real systems involved ▶ Select a phase above to begin the simulation...
🛡️

MODULE 04 — DEFENDER MODE

Now you're the defender. An attacker is actively targeting your network. Use your defensive tools to block incoming attacks before your system is compromised.

// OBJECTIVE: Successfully defend your system — Keep system health above 0%

// Network Defense Simulator

The attacker moves first each round. Choose your defensive action to counter the threat. React wisely — some defenses work better than others.

⚡ ATTACKER

PERSISTENCE100%
Preparing attack...
VS

🛡️ YOUR SYSTEM

SYSTEM HEALTH100%
CHOOSE DEFENSE:
// COMBAT LOG
[ System initialized — Waiting for attack... ]
[ Round 1 incoming — Choose your defense action ]
🏗️

MODULE 05 — BUILD YOUR DEFENSE STACK

A strong security posture uses layered defenses — the "Defense in Depth" strategy. Drag security tools into the correct layer to build a complete defense architecture.

// OBJECTIVE: Place 10+ security tools into the correct defense layers

// Defense in Depth — Architecture Builder

Drag each security tool from the pool on the left into the most appropriate defense layer on the right. Click placed tools to remove them. Place at least 10 to complete the lab.

// AVAILABLE TOOLS

// YOUR DEFENSE ARCHITECTURE

Tools Deployed: 0 / 10 minimum