The game that'll take you through the world of cyber security threats:
You’ll be faced with different vulnerabilities and vectors such as leaked credentials and assets, and will have to select the right course of action to manage them.
How do you think you’ll do?