We use cookies to enhance your experience and analyze site usage. You can at any time.
Subject Area
Cyber security
2 Scenarios
3 Formats
Available Formats
VR
2
TABLET
2
DESKTOP
2
Showing 2 of 2 scenarios
Introduction to phishing detection and email threat analysis
Work through a realistic phishing scenario where you analyse a suspicious email, identify threat indicators and decide on the safest course of action to protect organisational systems.
Introduction to DDoS attack analysis and mitigation strategies
Work through a simulated DDoS attack where you analyse traffic patterns, apply mitigation techniques and maintain business continuity while preparing for post‑attack recovery.