Available Exercise Definitions
The INJECT team has prepared an example content that is available to you for the ease of adoption of IXP.
- All the zip files contain
README.md, where you can find additional information about the exercise definition.
Warning
- The provided exercise definitions are of definition version 0.24.7 and work only with platform version 5.0.X.
- If you want to edit the following exercise definition, you might find our VSCode Extension useful.
| Definition Name | Needs Instructor | Language | Goal | Download |
|---|---|---|---|---|
| Insider Threat | NO | English | Train insider threat response from detection to mitigation. | Download |
| Introductory Definition | NO | English | Platform tutorial. | Download |
| Phishing Uni | YES | English | Train phishing handling at University. | Download |
| Phone Loss | NO | English | Train response to loss of mobile device. | Download |
| Ransomware Rezonio | NO | Czech | Participants will propose ways to reduce and assess the risk of a ransomware attack. | Download |
| Remote Workers | NO | English | Raising awareness and encouraging the use of approved tools, organizations can protect data integrity, ensure compliance with legal and regulatory requirements, and reduce vulnerabilities associated with remote and collaborative work. | Download |
| Security Training Call | NO | Czech | Train recognition and response to social engineering and deepfakes. | Download |
| Security Training Notebook | NO | Czech | Train log analysis to detect unauthorized access. | Download |
| Security Training Phishing | NO | Czech | Train phishing email identification and reporting. | Download |
| Showcase Definition | YES | English | Demonstrate platform capabilities through a personally identifiable information breach scenario. | Download |
| Supply Chain | NO | Czech | Participants will propose ways to reduce risks in supplier management and compare supplier-related issues and challenges according to their degree of impact. | Download |
| Threat Modeling | NO | English | To introduce participants to the foundational concepts of threat modeling and its relevance to maritime cybersecurity. | Download |