Dr. Erdal Ozkaya
Search
  • Home
  • About Me
  • Home
  • About Me
  • Home
  • General
  • Who Hacked? Free Online Game

Who Hacked? Free Online Game

Who hacked
Erdal2022-11-21T13:19:51-04:00

Who Hacked?

Table of Contents

    • Who Hacked?
    • Are you up for the challenge?
    • Keeping up Appearances
    • In the Crosshairs
  • Make the most of Microsoft Learn Cloud Games
  • Data Feeds
  • Keeping up Appearances
  • In the Crosshairs
  • Stop the Waste
  • Crisis Response

Here is a great resource for all of you, a hacking game developed by Microsoft, which I have contributed as SME…

In Who Hacked?, e-retailer ‘Best for You Organics’ is about to launch a major expansion when it discovers a serious data breach. A hacker has stolen critical files and threatens to sabotage customer trust unless a ransom is paid.

Your challenge is to use your proficiency with Azure, Microsoft Defender, Microsoft Sentinel, and other tools to identify the source of the hack and to implement solutions to help ensure that it can’t happen again.

You can play the game from via the below link:

https://www.microsoft.com/en-us/cloudgames/registrationform?catalogCode=CG-SC-WH-001 

Are you up for the challenge?

Who Hacked? is a game in which players are detectives, gathering clues and evidence to investigate, remediate, and protect against cybersecurity incidents at Best for You Organics (BFYO), one of the largest organic produce e-retailers in the nation.

Keeping up Appearances

Gather and follow the forensic clues and evidence to investigate and tackle a ransomware attack at Best for You Organics (BFYO). Use Microsoft tools, like Microsoft Sentinel, Microsoft 365 Defender and Microsoft Purview compliance portal to find the culprit, remediate, configure compliance policies and protect against future cybersecurity incidents.

In the Crosshairs

Best For You Organics (BFYO) is under another cyber security attack. Uncover whose data in the company has been compromised, and to what extent. Determine how it happened using Microsoft 365 Defender, Microsoft Sentinel, and Azure AD. Remediate and protect against future attacks.

 

Microsoft Learn has brought to life an innovative experiential approach with the introduction of interactive Cloud Games. Designed especially for security and data & AI professionals with an intermediate knowledge level across a range of Microsoft solutions, Who Hacked? and Data Feeds are fun, immersive role-playing games with the mission of refreshing and reinforcing your IT expertise.

Both Cloud Games include two episodes that can be played in any order and that present you with multifaceted opportunities to practice skills that are essential for your in-role success. The detailed Who Hacked? study guide and Data Feeds study guide include learning paths and modules to help you prepare for and get the maximum benefit from playing the games.

In designing the activities, we started first with the game mechanics, built on exciting storylines, and then wove the learning goals into them—rather than identifying a learning topic and developing a game around it. This approach helps to ensure that you are engaged and having fun, which is a proven way to deepen skills.

Make the most of Microsoft Learn Cloud Games

Make Cloud Games a key part of your learning journey and have fun flexing your technical skills. Play Microsoft Learn Cloud Games now.

Additionally, if you’re looking to build your skills to help open career doors, explore Microsoft Learn, where you can find comprehensive technical training opportunities, including experiential learning, self-paced training, like learning paths and modules, and instructor-led training, such as courses for specific technologies, exams, certifications, and much more.

For more info click here 

Data Feeds

Data engineers, data scientists, and data analysts––this connect the circuit game challenges and expands your data and AI skills as you help a specialized consulting firm, Trey Research, solve the vitally important problem of food waste. Put your knowledge and experience with Azure Synapse, Azure Machine Learning, and Power BI to the test as you optimize Trey Research’s Insight Engine and help bring relief to the people of Hadria, whose island home has just been struck by a natural disaster.

Keeping up Appearances

The nation’s largest e-retailer, Best for You Organics, is under attack! Gather clues and evidence to investigate a ransomware attack. Use Microsoft tools, like Microsoft Sentinel, Microsoft 365 Defender, and Microsoft Purview compliance portal to find the culprit, configure compliance policies, remediate the attacks, and protect against future cybersecurity incidents.

In the Crosshairs

It’s all hands on deck at Best for You Organics, as it is under another cybersecurity attack and you are working through a high-priority cybersecurity alert. Your mission: use Microsoft 365 Defender, Microsoft Sentinel, and Azure AD to uncover whose data has been compromised, when and how it happened, and how best to remediate and protect against future attacks.

Stop the Waste

Trey Research needs your help to gather, predict, and present insight that powers the circuitry of the firms Insight Engine. Using tools like Azure Synapse Analytics, Azure Machine Learning, and Power BI, you’ll build an initial demo by “completing the circuit” and transform swaths of data into powerful insights and predictive models to solve the problem of food waste.

Crisis Response

A natural disaster hits the island country of Hadria and its citizens are in dire need of food. Your expertise in data and AI are needed to put the model to the test. You’ll use tools like Azure Synapse Analytics, Azure Machine Learning, and Power BI to automate and optimize large amounts of data at scale to discover new solutions to this crisis.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

Cloud Security

Cloud Security Cartoon featuring Dr Erdal – 2021

Cloud Security Cartoon featuring Dr Erdal https://youtu.be/D9HrY0h0jVk (more…) read more
Top Cyber blogs

Best Cybersecurity Blogs – Top 100 –

Best Cybersecurity Blogs I am delighted to announce that my blog has been recognized in the Top 100 Cybersecurity blogs by... read more
EC-Council Global Instructor of the Year Award Erdal Ozkaya

CEH review (312-50)

CEH review As Instructor (CEI , check here) of the year for EC Council classes, many of my students are asking how... read more
Cyber Summit KSA Erdal Ozkaya

CYBERSECURITY SUMMIT SAUDI ARABIA 2021 – Free and Online

CYBERSECURITY SUMMIT SAUDI ARABIA 2021 The CyberSecurity Summit is an exclusive virtual event for 200+ cybersecurity leaders from leading businesses in... read more
The Use Of Social Media for Terrorism

The Use Of Social Media for Terrorism

The Use Of Social Media for Terrorism   Abstract: This study goes through the ways in which terrorists have been exploiting social... read more
GISEC 2023

GISEC 2023- One more great event is coming your way for FREE

GISEC 2023 With the ever-changing global landscape, it is increasingly essential to strengthen cybersecurity across industries. GISEC Global offers a platform... read more
DevSecOPs

4 Benefits of Development Security Operations

Benefits of Development Security Operations DevSecOps , short for development, security, and operations —automates the integration of security at every phase... read more
Best Cybersecurity Books Of All Time

10 Best Cybersecurity Books Of All Time by Cybercrime Magazine

10 Best Cybersecurity Books Of All Time by Cybercrime Magazine As featured on CNN, Forbes and Inc. Magazine – Cybercrime Magazine... read more
Cybersecurity Regulations

New Cybersecurity Regulations 2 follow

New Cybersecurity Regulations New Cybersecurity Regulations Are Coming. Here’s How to Prepare. Credit : HBR , by Stuart Madnick read it directly... read more
CISO mag Erdal

CISO MAG Turns 3! Your Free Cybersecurity Mag

CISO Mag Turns Three ! Three years ago, on July 14, 2017, we launched CISO MAG with a vision to report... read more

Categories

  • About Dr Erdal Ozkaya (298)
    • Awards (96)
    • Erdal in the news (118)
    • Feedback (90)
    • My Books (54)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (302)
  • Artificial Intelligence AI (10)
  • Certification (52)
  • Cloud Computing (72)
  • Cybersecurity (322)
  • Cybersecurity Leadership (52)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (156)
  • General (133)
  • How to …? (63)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (33)
    • Free E-Books (13)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Erdal on Siber Güvenlik Saldiri ve Savunma Stratejileri – NEW B00K

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.