Hosting your own KC7 Cyber Competition
A brief introduction to KC7 Cyber Competions
About the KC7 Game
Traditional cybersecurity training and classes often start by teaching abstract concepts that don’t apply directly to real-world scenarios, and rarely give students the opportunity to approach these concepts in a hands-on way. This approach can cause students to lose interest and drop out before they even have a chance to understand the field. KC7, an online cybersecurity game built by threat intelligence experts who have years of experience studying advanced cyber adversaries, takes a different approach.
KC7 introduces cybersecurity concepts in a way that everyone from middle school students through adult learners can understand and get excited about. Players work as cybersecurity analysts to investigate a cyber intrusion against a fictitious organization. During the investigation, they encounter different attack types, capabilities, and frameworks, all while learning general cybersecurity concepts.
About the KC7 Competition
The KC7 Competition is a 2-4-hour event where players work in teams to complete one of the KC7 game modules. These are self-hosted events organized by nonprofits, corporate groups, educators, and others who want to promote diversity and inclusion in cybersecurity education by offering no-cost learning opportunities to participants.
KC7 Cyber Competition participants will gain experience…
Using query languages to identify malicious attacks in log data, i.e, Kusto Query Language (aka KQL) and Storm Query Language (aka Storm)
Using tools such as Azure Data Explorer (aka ADX) and Synapse
Making data-driven assessments to answer technical questions about threat activity
Finding malicious cyber activity in various types of security logs, including email, web traffic, and endpoint
Using multiple techniques to track the activity of APTs (Advanced Persistent Threats)
Using third party data sets to build knowledge about threat actors
Contextualizing data to communicate technical findings
Making recommendations on what actions a company can take to protect themselves
Last updated