Activity 01
Role-Play: Breach Response Simulation
Present a scenario of a detected intrusion via email logs. Groups assign roles for each response phase, document actions in sequence, then debrief as a class on gaps. Use free tools like sample PCAP files for evidence review.
Explain the steps involved in a typical network incident response plan.
Facilitation TipFor the Role-Play: Breach Response Simulation, assign clear roles (e.g., incident commander, log analyst) and rotate them so students see the situation from multiple perspectives.
What to look forPresent students with a short, anonymized log snippet from a web server. Ask them to identify one suspicious entry and explain why it might indicate an attack, referencing specific log fields.