SERVICES
mssp
Managed Services
>
Security Operations Center
>
Endpoint Protection
Operational Technology
Tabletop Exercises
Continuous Monitoring
Security and Compliance
>
Microsoft Purview
NIST 800-171 Assessments
CMMC Assessments
Incident Response
Penetration Testing
Vulnerability Assessments
Phishing Simulations
SOFTWARE
Azure Migrations
>
Azure Security and Federation
Identity and Access Management
Dynamics 365
SQL Management
DevSecOps
Application Security
Software Products
>
Vulnerability Genius Software
eMASS Simulator Software
ICS - SCADA Simulations
CyberLMS Software
Training
Training Schedule
Certification
>
Most Popular Certifications
>
COMPTIA SECURITY+
CEH
CISM
ISC2-CISSP
CLOUD COMPUTING
AGILE AND SCRUM
ARTIFICAL INTELLIGENCE
DEVOPS
Cybersecurity Certifications
>
ISC2-CC
ISC2-SSCP
ISC2-CGRC
ISC2-CSSLP
ISC2-ISSAP
ISC2-ISSEP
ISC2-ISSMP
ISACA-CISA
COMPTIA CASP+
COMPTIA CLOUD ESSENTIALS+
COMPTIA CLOUDNETX
COMPTIA DATA+
COMPTIA DATASYS+
COMPTIA DATAX
COMPTIA NETWORK+
COMPTIA PENTEST+
ISC2-CISSP
COMPTIA SECURITY+
COMPTIA SECURITYX
CEH
COMPTIA LINUX+
CISM
COMPTIA CYSA+
ISC2-CCSP
COMPTIA CLOUD+
COMPTIA A+
Microsoft Certifications
>
SC-100
SC-200
AZ-500
SC-900
AZ-900
MS-900
PL-900
TOPICS
>
CYBERSECURITY
CLOUD COMPUTING
ARTIFICAL INTELLIGENCE
VIRTUALIZATION
DEVOPS
AGILE AND SCRUM
BRANDS
>
ISC2
COMPTIA
MICROSOFT
EC|COUNCIL
ISACA
AWS
CISCO
RED HAT
VMWARE
CMMC Workshop
Tabletop Exercises
ICS - SCADA Training
YouTube Channel
Online Courses
BLOGS
Contact
CyberProtex - Crypto Bucket Game
CyberProtex - Authentication Game
Drag and Drop the Appropriate Attack terms in to the appropriate Category.
Once you have all of the answers correct you will receive a message.
Phishing
Pharming
Spear Phishing
Hoax
Vishing
Attack Vector
Target
Attack Type
Attacker obtains confidential company information
Targeted CEO and Board Members
?????
Attacker posts link to fake AV Software
Broad Set of Victims
?????
Attacker Collecting Credit Card Details
Phone Based Victim
?????
Attacker Mass Emails Product information to parties who have already opted out of receiving advertisements
Broad set of recipients
?????
Attacker Redirects Name Resolutions entries from legitimate website to fraudulent website
Victims
?????
SERVICES
mssp
Managed Services
>
Security Operations Center
>
Endpoint Protection
Operational Technology
Tabletop Exercises
Continuous Monitoring
Security and Compliance
>
Microsoft Purview
NIST 800-171 Assessments
CMMC Assessments
Incident Response
Penetration Testing
Vulnerability Assessments
Phishing Simulations
SOFTWARE
Azure Migrations
>
Azure Security and Federation
Identity and Access Management
Dynamics 365
SQL Management
DevSecOps
Application Security
Software Products
>
Vulnerability Genius Software
eMASS Simulator Software
ICS - SCADA Simulations
CyberLMS Software
Training
Training Schedule
Certification
>
Most Popular Certifications
>
COMPTIA SECURITY+
CEH
CISM
ISC2-CISSP
CLOUD COMPUTING
AGILE AND SCRUM
ARTIFICAL INTELLIGENCE
DEVOPS
Cybersecurity Certifications
>
ISC2-CC
ISC2-SSCP
ISC2-CGRC
ISC2-CSSLP
ISC2-ISSAP
ISC2-ISSEP
ISC2-ISSMP
ISACA-CISA
COMPTIA CASP+
COMPTIA CLOUD ESSENTIALS+
COMPTIA CLOUDNETX
COMPTIA DATA+
COMPTIA DATASYS+
COMPTIA DATAX
COMPTIA NETWORK+
COMPTIA PENTEST+
ISC2-CISSP
COMPTIA SECURITY+
COMPTIA SECURITYX
CEH
COMPTIA LINUX+
CISM
COMPTIA CYSA+
ISC2-CCSP
COMPTIA CLOUD+
COMPTIA A+
Microsoft Certifications
>
SC-100
SC-200
AZ-500
SC-900
AZ-900
MS-900
PL-900
TOPICS
>
CYBERSECURITY
CLOUD COMPUTING
ARTIFICAL INTELLIGENCE
VIRTUALIZATION
DEVOPS
AGILE AND SCRUM
BRANDS
>
ISC2
COMPTIA
MICROSOFT
EC|COUNCIL
ISACA
AWS
CISCO
RED HAT
VMWARE
CMMC Workshop
Tabletop Exercises
ICS - SCADA Training
YouTube Channel
Online Courses
BLOGS
Contact