LogoLogo
Play KC7
Welcome to KC7
Welcome to KC7
  • KC7 For Educators (FAQ)
    • Integrating KC7 into the Classroom
    • Support and Resources
    • Using KC7 in the Classroom
  • KC7 Tenants
    • Getting Started
    • Managing Users
    • Managing Games
    • Tracking Performance
  • Hosting your own KC7 Cyber Competition
    • 🎇Request an event
    • 📚Planning Your Event
    • ✅Check the requirements
    • 📢Spreading the Word
    • 🛣️Layout of the Event
    • 🎮Setting up your game
    • 📑Doing Your Homework
    • 🎉The Big Day
      • For in-person events
      • For virtual events
    • 🙏Closing Your Event
    • 🤝After Your Event
  • Need help? Ask questions in the KC7 Discord
Powered by GitBook

Copyright KC7 Foundation

On this page
  • About the KC7 Game
  • About the KC7 Competition

Hosting your own KC7 Cyber Competition

A brief introduction to KC7 Cyber Competions

PreviousTracking PerformanceNextRequest an event

Last updated 1 year ago

About the KC7 Game

Traditional cybersecurity training and classes often start by teaching abstract concepts that don’t apply directly to real-world scenarios, and rarely give students the opportunity to approach these concepts in a hands-on way. This approach can cause students to lose interest and drop out before they even have a chance to understand the field. KC7, an online cybersecurity game built by threat intelligence experts who have years of experience studying advanced cyber adversaries, takes a different approach.

KC7 introduces cybersecurity concepts in a way that everyone from middle school students through adult learners can understand and get excited about. Players work as cybersecurity analysts to investigate a cyber intrusion against a fictitious organization. During the investigation, they encounter different attack types, capabilities, and frameworks, all while learning general cybersecurity concepts.

About the KC7 Competition

The KC7 Competition is a 2-4-hour event where players work in teams to complete one of the KC7 game modules. These are self-hosted events organized by nonprofits, corporate groups, educators, and others who want to promote diversity and inclusion in cybersecurity education by offering no-cost learning opportunities to participants.

KC7 Cyber Competition participants will gain experience…

  • Using query languages to identify malicious attacks in log data, i.e, Kusto Query Language (aka KQL) and Storm Query Language (aka Storm)

  • Using tools such as Azure Data Explorer (aka ADX) and Synapse

  • Making data-driven assessments to answer technical questions about threat activity

  • Finding malicious cyber activity in various types of security logs, including email, web traffic, and endpoint

  • Using multiple techniques to track the activity of APTs (Advanced Persistent Threats)

  • Using third party data sets to build knowledge about threat actors

  • Contextualizing data to communicate technical findings

  • Making recommendations on what actions a company can take to protect themselves

https://kc7cyber.com/modules/
Page cover image