Week 1 — Introduction to Cybersecurity. This lab puts you in the seat of both attacker and defender. Learn by doing.
Every security decision revolves around three core principles. Click each pillar to explore, then classify real-world scenarios to test your understanding.
Click each pillar to learn what it means and why it matters.
Click Confidentiality, Integrity, or Availability to explore each concept in depth.
Read each breach scenario. Click which CIA principle is MOST violated. Complete all 5 to proceed.
Cybersecurity threats come in many forms. Expand each threat type to study how it works, then explore real-world examples.
Click any threat card to reveal detailed mechanics, attack steps, and documented real-world incidents.
Attacks don't happen instantly. They follow a predictable sequence called the Cyber Kill Chain. Step through a live simulated attack to understand each phase.
You are simulating the perspective of a threat actor targeting a fictional company. Execute each phase in order to understand how attacks unfold.
Now you're the defender. An attacker is actively targeting your network. Use your defensive tools to block incoming attacks before your system is compromised.
The attacker moves first each round. Choose your defensive action to counter the threat. React wisely — some defenses work better than others.
A strong security posture uses layered defenses — the "Defense in Depth" strategy. Drag security tools into the correct layer to build a complete defense architecture.
Drag each security tool from the pool on the left into the most appropriate defense layer on the right. Click placed tools to remove them. Place at least 10 to complete the lab.