Exercises

Supporting material for the exercises is here. The exercises are quite different in nature and complexity: choose appropriately. If the first exercise you run is well-received you can of course run additional exercises. Each exercise includes three documents: notes and a turn guide for you , the facilitator; handouts; and slides to display in the room .

Targeted Data Breach

DDoS (Distributed Denial of Service)

(Additional exercises will be added here shortly: Major Data Breach and Ransomware.)