Explore all CASE modules

Browse the full module catalog, filter by category, and jump directly into a case study.

Anthem module image
Comprehensive Cases

Anthem

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
anthememail phishingactive persistent attack (APT)scanbox+1 more
DDoS Attacks module image
Comprehensive Cases

DDoS Attacks

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
DDoS attacksreflective DDoS attacksIP Spoofing
MOVEit Breach module image
Comprehensive Cases

MOVEit Breach

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
sqlaptmalware
SolarWinds Hack module image
Comprehensive Cases

SolarWinds Hack

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
Supply chain securityAPT attackbackdoors
Target Data Breach module image
Comprehensive Cases

Target Data Breach

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
targetemail phishingactive persistent attack (APT)malware+1 more
City of Oakland Ransomware Attack module image
Malware Cases

City of Oakland Ransomware Attack

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
ransomwarecyber attackmunicipal cybersecuritydata breach
Mail Service Ransomware Attack module image
Malware Cases

Mail Service Ransomware Attack

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
ransomwaremalware threat
Stuxnet Malware module image
Malware Cases

Stuxnet Malware

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
malwarezero day vulnerabilitiescyber physical systems
Tampa General Hospital Breach module image
Malware Cases

Tampa General Hospital Breach

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
ransomwarehospitalmalware
WannaCry Ransomware module image
Malware Cases

WannaCry Ransomware

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
ransomwarezero day vulnerabilitiesmalware
Facebook Scandal module image
Management Cases

Facebook Scandal

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
FacebookData securityData privacy
JPMorgan Chase Data Breach module image
Management Cases

JPMorgan Chase Data Breach

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
JPMorganData securityData privacy
SWIFT Bank Hack module image
Management Cases

SWIFT Bank Hack

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
SWIFT BankData securityData privacy
Capital One Breach module image
Network & Cloud Security Cases

Capital One Breach

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
Capital OneWeb SecurityCloud SecurityInsider Attacks
Deloitte and Accenture Breaches module image
Network & Cloud Security Cases

Deloitte and Accenture Breaches

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
DeloitteAccentureData breachPatch Management+1 more
Equifax module image
Network & Cloud Security Cases

Equifax

Explore this module for practical cybersecurity learning activities and guided review.
Mirai IoT Botnet module image
Network & Cloud Security Cases

Mirai IoT Botnet

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
MiraiDDoS attacksIoT securityMalware
Verkada Camera Breach module image
Network & Cloud Security Cases

Verkada Camera Breach

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
IoTprivacymalware
Password Management module image
Social Engineering Cases

Password Management

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
Social engineeringPassword managementTwo factor authentication
CPU Meltdown Exploit module image
System Software & Hardware Security Cases

CPU Meltdown Exploit

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
MeltdownCPU vulnerabilityOut of order executionSide channel attack+1 more
Industroyer2 Breach module image
System Software & Hardware Security Cases

Industroyer2 Breach

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
infrastructureindustrial control systemmalware
OpenSSL Heartbleed Vulnerability module image
System Software & Hardware Security Cases

OpenSSL Heartbleed Vulnerability

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
Software securityZero day vulnerabilityBuffer overflow attacks
Pennsylvania Water Breach module image
System Software & Hardware Security Cases

Pennsylvania Water Breach

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
infrastructureindustrial control systemmalware
Security in Automobiles module image
Special Topics

Security in Automobiles

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
car hackingCAN vulnerabilitiesremote exploitationvehicle cybersecurity
Medical Device Security module image
Special Topics

Medical Device Security

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
medical devicescybersecurityimplantable deviceshealthcare IT+1 more
Storm-0558 Government Hacking Campaign module image
Special Topics

Storm-0558 Government Hacking Campaign

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
cyber espionageAPTMicrosoft security breach
23andMe Data Leak module image
Web Security

23andMe Data Leak

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
data breachdata scrapinggenetic data privacycredential stuffing
UK Electoral Commission Hack module image
Web Security

UK Electoral Commission Hack

Explore this module for practical cybersecurity learning activities and guided review.
Keywords
cyber attackUK Electoral Commissiondata breachnation state threat