Skip to content

Available Exercise Definitions

The INJECT team has prepared an example content that is available to you for the ease of adoption of IXP.

  • All the zip files contain README.md, where you can find additional information about the exercise definition.

Warning

  • The provided exercise definitions are of definition version 0.24.7 and work only with platform version 5.0.X.
  • If you want to edit the following exercise definition, you might find our VSCode Extension useful.

Definition Name Needs Instructor Language Goal Download
Insider Threat NO English Train insider threat response from detection to mitigation. Download
Introductory Definition NO English Platform tutorial. Download
Phishing Uni YES English Train phishing handling at University. Download
Phone Loss NO English Train response to loss of mobile device. Download
Ransomware Rezonio NO Czech Participants will propose ways to reduce and assess the risk of a ransomware attack. Download
Remote Workers NO English Raising awareness and encouraging the use of approved tools, organizations can protect data integrity, ensure compliance with legal and regulatory requirements, and reduce vulnerabilities associated with remote and collaborative work. Download
Security Training Call NO Czech Train recognition and response to social engineering and deepfakes. Download
Security Training Notebook NO Czech Train log analysis to detect unauthorized access. Download
Security Training Phishing NO Czech Train phishing email identification and reporting. Download
Showcase Definition YES English Demonstrate platform capabilities through a personally identifiable information breach scenario. Download
Supply Chain NO Czech Participants will propose ways to reduce risks in supplier management and compare supplier-related issues and challenges according to their degree of impact. Download
Threat Modeling NO English To introduce participants to the foundational concepts of threat modeling and its relevance to maritime cybersecurity. Download