Select a simulation scenario to begin training.
A crypto-locker is spreading through the executive subnet via SMB.
Complex exfiltration involving authorized credentials and political pressure.
A trusted vendor is compromised. The enemy is already inside the walls.