In this game, learners role-play as an undercover operative for HackOps and learn how cyber attackers use common tactics, techniques, and procedures (TTPs) to break into the network, steal data and install ransomware (e.g. spear phishing and exploiting vulnerabilities, among others).
Hackers do reconnaissance
Spear phishing is crafted and executed
Front-door internet-facing IT assets’ vulnerabilities are exploited
Third-party vulnerabilities are exploited to break in from the back door
Data is exfiltrated and ransomware is installed and how this could be prevented
Unknown back doors are left behind and why
In this game, learners get first-hand experience with multi-phased cyber attacks, simulated from actual recent cyber attack cases, by completing real-world exercises from a hacker’s perspective. There is also a “Hollywood” movie-style surprise ending waiting for the learners at the end of the game.
Headsets are not required to experience this course! But, if you'd like to use VR headsets, these are the ones we suggest: Meta Quest, Quest 2, Quest Pro, Rift, Pico G24K, Neo 2, Neo 3, Neo 4, HTC Vive, Vive Focus, or Vive Pro.
8 AM – 5 PM MST
Meet with other L&D professionals, share your creations, learn tips and tricks, and so much more!
Visit the Knowledge Base for tutorials, help articles, and getting started guides on all our products.