Welcome to our resource hub. Please select the activity you are taking part in today.
Using a collection of hardware and software resources, create a network of devices and view encrypted and unencrypted traffic.
Using tools developed by GCHQ to decrypt secret messages and encrypt your own.
Using an ethical hacker virtual machine, investigate your assigned target. Build up an investigation!
Investigate the daily lives of your targets and discover information about their lives. Use this information to hack into a target service.
Incident Response is like having an emergency plan for computers and technology. If something bad happens, like hackers break in, a virus spreads, or systems crash, the organisation needs to act fast.