Skip to main content

Free Security Awareness Training For Everyone

Interactive 3D cybersecurity simulations and employee security training exercises. No sign-up, no paywall. Start learning immediately.

90+
Free Exercises
3D
Interactive
100%
Handmade
Exercise Library

What Security Awareness Exercises Are Available?

Master employee cybersecurity fundamentals with interactive 3D simulations and hands-on security exercises.

Showing 90exercises

Callback Phishing

Handle a fake invoice designed to make you call.

  • Identify TOAD attack patterns
  • Spot fake invoices with callback numbers
  • Respond without clicking any links
Play Exercise

Phishing

Spot a phishing email before you click.

  • Identify spoofed senders and URLs
  • Recognize credential theft attempts
  • Report phishing through proper channels
Play Exercise

Vishing

Handle a realistic voice phishing call.

  • Detect caller ID spoofing tactics
  • Practice callback verification steps
  • Resist urgency and authority pressure
Play Exercise

Smishing

Detect fraud hiding in your text messages.

  • Spot SMS phishing red flags
  • Understand why text links get more clicks
  • Verify messages without tapping links
Play Exercise

Double Barrel Phishing

Recognize the two-email trust trap.

  • Identify the benign setup message
  • Spot the malicious follow-up payload
  • Break the false trust chain
Play Exercise

Business Email Compromise

Stop a CEO impersonation wire fraud.

  • Detect executive impersonation emails
  • Verify payment requests out-of-band
  • Understand BEC financial impact
Play Exercise

Social Engineering

Recognize manipulation before you comply.

  • Detect pretexting and authority scams
  • Practice verification under pressure
  • Understand the human element in breaches
Play Exercise

Whaling With A Deepfake

Spot an AI-generated executive on a video call.

  • Detect deepfake video call indicators
  • Verify identity during live meetings
  • Learn from the $25M Hong Kong case
Play Exercise

Backup Best Practices

Build a backup plan that survives ransomware.

  • Apply the 3-2-1 backup rule
  • Distinguish sync from true backup
  • Test restoration before you need it
Play Exercise

Encryption & Lock Discipline

Practice the habits that protect unattended devices.

  • Enable full disk encryption
  • Build a screen-locking habit
  • Secure devices in physical spaces
Play Exercise

OS Updates & Patching Basics

See why skipping updates opens real attack paths.

  • Prioritize security patches by severity
  • Learn from the WannaCry outbreak
  • Set effective auto-update policies
Play Exercise

Ransomware

Survive a ransomware attack in real time.

  • Respond to a live ransomware scenario
  • Follow containment and isolation steps
  • Preserve evidence for forensic analysis
Play Exercise

USB Drop Attack

Think twice before plugging in that USB drive.

  • Recognize planted USB devices
  • Understand Rubber Ducky payloads
  • Follow safe handling procedures
Play Exercise

Endpoint Patching & EDR Alerts

Know what your EDR alert means and what to do next.

  • Respond correctly to EDR security alerts
  • Triage alerts by severity level
  • Check your device's patch status
Play Exercise

Account Recovery Security

Defend account recovery from social engineering.

  • Verify identity before processing recovery requests
  • Recognize pretexting tactics targeting help desks
  • Secure recovery questions and backup methods
Play Exercise

Credential Stuffing Awareness

See how breached passwords fuel automated attacks.

  • Understand how credential stuffing works
  • Check if your accounts appear in breaches
  • Break the password reuse chain
Play Exercise

Joiner-Mover-Leaver Awareness

Manage access rights through role transitions.

  • Request correct access during onboarding
  • Adjust permissions when changing roles
  • Ensure clean offboarding removes all access
Play Exercise

Least Privilege Awareness

Keep access to the minimum your job requires.

  • Identify when you have more access than needed
  • Request and approve access changes properly
  • Spot permission creep before auditors do
Play Exercise

MFA Setup & Best Practices

Set up multi-factor authentication the right way.

  • Compare SMS, authenticator, and hardware keys
  • Recognize and resist MFA fatigue attacks
  • Configure backup methods for account recovery
Play Exercise

Password Manager Habits

Build strong habits with your password manager.

  • Generate unique passwords for every account
  • Use autofill as a phishing detection tool
  • Maintain a clean, organized password vault
Play Exercise

Privileged Access Basics

Learn why admin accounts need special handling.

  • Apply just-in-time access principles
  • Practice separation of duties
  • Secure root and admin credentials
Play Exercise

HTTPS & Website Security

Learn why the padlock icon is not proof of safety.

  • Understand what TLS actually protects
  • Spot expired and mismatched certificates
  • Move past padlock misconceptions
Play Exercise

Safe Browsing & Downloads

Spot malicious downloads before they run.

  • Recognize fake update prompts
  • Verify file signatures before executing
  • Avoid drive-by download traps
Play Exercise

Typosquatting Awareness

Catch the domain tricks attackers use against you.

  • Spot lookalike and homograph domains
  • Build URL verification habits
  • Recognize common typosquatting patterns
Play Exercise

General Incident Reporting

Know when and how to report a security incident.

  • Recognize what qualifies as an incident
  • Complete a security report correctly
  • Understand reporting timelines and thresholds
Play Exercise

Reporting Culture

Build a team that reports without fear.

  • Practice blameless incident reporting
  • Understand psychological safety principles
  • Apply the aviation CRM framework
Play Exercise

Cloud Sharing Controls

Audit who can see your shared files right now.

  • Review and tighten sharing permissions
  • Set link expiration dates
  • Find over-shared files before auditors do
Play Exercise

Guest Access Management

Control what external users can reach and for how long.

  • Set time-bound guest permissions
  • Audit and remove dormant accounts
  • Limit vendor access to specific resources
Play Exercise

Secure Messaging Practices

Stop sensitive data from leaking through chat apps.

  • Avoid sharing secrets in Slack or Teams
  • Spot compromised account behavior
  • Use proper channels for sensitive data
Play Exercise

Social Media Policy

Learn what not to post on corporate accounts.

  • Identify OPSEC risks in social posts
  • Avoid accidental data leaks online
  • Apply corporate social media guidelines
Play Exercise

Social Media Oversharing

See how attackers exploit your public profiles.

  • Discover what OSINT reveals about you
  • Understand how posts enable spear phishing
  • Audit your own social media exposure
Play Exercise

Third-Party App OAuth Risks

Check what you gave permission to access.

  • Review OAuth permissions on your accounts
  • Spot excessive permission requests
  • Revoke access from unused or suspicious apps
Play Exercise

Audit Mindset Basics

Think like an auditor to find compliance gaps.

  • Identify control weaknesses before auditors do
  • Map evidence to common audit frameworks
  • Prioritize findings by risk severity
Play Exercise

Audit Portal Training

Navigate GRC portals and submit audit evidence.

  • Upload and tag compliance evidence correctly
  • Track remediation tasks to closure
  • Avoid common portal submission errors
Play Exercise

Employee Security Responsibilities

Know your personal security duties at work.

  • Recognize tailgating and credential sharing risks
  • Report incidents through the right channels
  • Protect physical and digital access points
Play Exercise

ISMS Policy Awareness

Connect ISO 27001 policies to your daily work.

  • Match ISMS policies to real work situations
  • Understand the ISO 27001 policy structure
  • Spot gaps between policy and daily practice
Play Exercise

Internet & Email Acceptable Use

Stay within corporate internet and email policies.

  • Recognize risky email forwarding behaviors
  • Understand personal device boundaries at work
  • Avoid common acceptable use violations
Play Exercise

Data Classification Basics

Label data correctly by sensitivity level.

  • Classify data as Public, Internal, or Restricted
  • Apply the right handling rules per level
  • Avoid mislabeling that leads to data exposure
Play Exercise

Identity Theft Prevention

Spot identity theft tactics targeting employees.

  • Detect fake HR and payroll redirect emails
  • Protect PII from social engineering attacks
  • Respond quickly when personal data is exposed
Play Exercise

Secure Sharing Practices

Share files safely without creating security gaps.

  • Set correct link permissions and expiration
  • Choose approved tools over shadow IT options
  • Encrypt sensitive files before sharing externally
Play Exercise

Data Leakage

Stop sensitive data from leaving your org.

  • Catch misdirected emails before sending
  • Strip hidden metadata from documents
  • Understand insider threat patterns
Play Exercise

Insider Threat (Intentional)

Recognize the warning signs of a malicious insider.

  • Spot behavioral indicators of data theft
  • Understand reporting responsibilities
  • Review real insider threat scenarios
Play Exercise

Shadow IT Awareness

Find out what happens when teams use unapproved apps.

  • Identify unauthorized SaaS tools
  • Understand compliance and data risks
  • Learn the approval request process
Play Exercise

Image-Based Attacks (Stegosploit)

That image file might be carrying more than pixels.

  • Understand how malware hides in images
  • Detect suspicious image file behavior
  • Apply safe image handling practices
Play Exercise

VPN Usage & Safety

Configure and use your VPN without leaving gaps.

  • Identify split tunneling risks
  • Handle dropped VPN connections safely
  • Apply VPN best practices for remote work
Play Exercise

Home Router Security

Find out who else is on your home network.

  • Change default router credentials
  • Spot unauthorized devices on your network
  • Update router firmware and enable WPA3
Play Exercise

Marketing Consent Management

Build compliant opt-in flows that regulators accept.

  • Apply GDPR Article 7 consent standards
  • Design proper consent withdrawal mechanisms
Play Exercise

Data Breach Response

Triage a breach and meet the 72-hour notification clock.

  • Apply Article 33 notification requirements
  • Assess breach severity and reporting thresholds
  • Draft a supervisory authority notification
Play Exercise

Privacy by Design Review

Evaluate a product feature through a privacy-first lens.

  • Apply Article 25 data minimization checks
  • Identify privacy gaps in product designs
Play Exercise

Legitimate DSAR Processing

Process a data subject access request end to end.

  • Verify requester identity under Article 15
  • Search and compile data across systems
  • Meet the 30-day response deadline
Play Exercise

PII Document Redaction

Redact personal data from documents before disclosure.

  • Strip PII from text and metadata layers
  • Avoid recoverable redaction failures
Play Exercise

Fraudulent DSAR Detection

Spot fake data access requests used for social engineering.

  • Identify fraudulent DSAR indicators
  • Apply Article 12(6) refusal grounds
Play Exercise

Third-Party Data Processor Vetting

Evaluate a vendor's data processing controls before signing.

  • Review DPA terms against Article 28
  • Assess sub-processor chains and controls
  • Apply vendor risk scoring frameworks
Play Exercise

Security Incident Response

Coordinate security and privacy teams during a live breach.

  • Run parallel security and privacy workstreams
  • Triage breach severity for Article 33 reporting
  • Apply IBM-benchmarked IR plan savings
Play Exercise

Cross-Border Data Transfers

Navigate transfer mechanisms for data leaving the EEA.

  • Select the right transfer mechanism (SCCs, BCRs)
  • Conduct a Transfer Impact Assessment
  • Apply Schrems II safeguard requirements
Play Exercise

Data Protection Impact Assessment

Run a DPIA for a high-risk data processing activity.

  • Identify Article 35 DPIA triggers
  • Apply structured risk assessment methodology
  • Document DPO consultation outcomes
Play Exercise

Data Mapping and Records of Processing

Build an Article 30 processing register from scratch.

  • Conduct cross-department data flow interviews
  • Create a compliant Records of Processing register
  • Map data flows across systems and vendors
Play Exercise
Soon

Privacy Breach Through Application Vulnerabilities

Discover a web application vulnerability that silently leaks personal data through error messages and insecure API responses.

  • Detect personal data exposure in application error messages and API responses
  • Trace how a broken access control flaw enables mass extraction of user records
  • Apply secure coding verification checks that prevent privacy-impacting vulnerabilities
Coming Soon
Soon

Internal Data Leakage to Unauthorized Parties

Contain a data leakage incident where customer PII reaches unauthorized vendors through misconfigured file sharing.

  • Trace how misconfigured access controls route sensitive data to unauthorized recipients
  • Identify personal data exposure in shared documents, exports, and collaboration tools
  • Apply data loss prevention controls that catch PII before it leaves authorized boundaries
Coming Soon
Soon

Handling a Personal Data Breach

Manage a data breach where your organization must contain the leak, notify regulators, and inform affected individuals under tight deadlines.

  • Execute a breach response timeline from detection through containment to regulatory notification
  • Identify failures in breach response that increase regulatory penalties and user harm
  • Apply structured incident response procedures that meet GDPR 72-hour notification requirements
Coming Soon
Soon

Consent Dark Patterns and Bundled Permissions

Fix a sign-up form that bundles multiple consent purposes into a single checkbox, violating granular consent requirements.

  • Identify bundled consent patterns that violate GDPR granularity requirements
  • Redesign consent flows to separate distinct processing purposes into individual choices
  • Apply consent design principles that give users meaningful control over their data
Coming Soon
Soon

Opaque Privacy Policies and Hidden Data Practices

Audit a corporate privacy policy that uses legal jargon to obscure how personal data is actually collected, stored, and shared.

  • Identify vague and misleading language in privacy notices that obscures actual data practices
  • Evaluate whether a privacy policy meets GDPR transparency and plain language requirements
  • Rewrite opaque policy clauses into clear, specific disclosures that users can actually understand
Coming Soon
Soon

Personal Data Deletion Failures

Trace a user's deletion request across backups, analytics systems, and third-party integrations to ensure no personal data persists.

  • Map personal data locations across production databases, backups, analytics, and third-party systems
  • Identify residual data that persists after standard account deletion procedures
  • Apply comprehensive deletion workflows that satisfy right-to-erasure requirements across fragmented data landscapes
Coming Soon
Soon

Outdated and Inaccurate Personal Data

Investigate how outdated and incorrect personal data in a CRM causes real harm through wrong credit decisions and misdirected communications.

  • Identify inaccurate, outdated, and duplicate records in a customer database that affect real individuals
  • Trace how data quality failures lead to concrete harms including wrong credit decisions and misdirected communications
  • Apply data quality controls including validation rules, update workflows, and accuracy auditing processes
Coming Soon
Soon

Session Hijacking Through Missing Expiration

Discover that a shared workstation retains full access to a previous user's personal accounts and medical records due to missing session expiration.

  • Identify persistent sessions on shared devices that expose previous users' personal data
  • Trace how missing session expiration enables unauthorized access to accounts, medical records, and financial data
  • Apply session management controls including timeout policies, device binding, and activity-based expiration
Coming Soon
Soon

Blocked Data Subject Access Requests

Fulfill a data subject access request by locating personal data scattered across fragmented systems before the regulatory deadline expires.

  • Locate personal data across fragmented databases, email archives, and third-party processors to fulfill a DSAR
  • Identify gaps in data inventory that prevent complete and timely response to access requests
  • Apply structured DSAR fulfillment workflows that meet the GDPR 30-day response deadline
Coming Soon
Soon

Excessive Personal Data Collection

Audit a registration form and analytics implementation that collect far more personal data than the service actually needs.

  • Identify personal data fields in forms and analytics that exceed what is necessary for the stated purpose
  • Evaluate each data collection point against the GDPR data minimization principle
  • Apply data minimization redesign to reduce collection to only what is strictly required for service delivery
Coming Soon

Clawdbot (Moltbot) Prompt Injection

Stop an AI assistant from leaking data via hidden prompts.

  • Identify hidden instructions in documents
  • Prevent data exfiltration through AI tools
  • Recognize prompt injection patterns
Play Exercise
Soon

LLM Prompt Injection Attack

Stop a hidden prompt from hijacking your AI assistant mid-task.

  • Detect hidden instructions embedded in documents processed by AI
  • Trace how injected prompts override legitimate AI behavior
  • Apply safe document handling before feeding content to AI tools
Coming Soon
Soon

Sensitive Data Exposure Through AI

See what happens when confidential data enters a consumer AI tool.

  • Recognize sensitive data categories that should never enter AI prompts
  • Trace how pasted content persists in AI training data and logs
  • Apply data classification policies before using AI tools
Coming Soon
Soon

AI Supply Chain Compromise

Deploy an AI plugin that hides a backdoor in plain sight.

  • Identify supply chain risks in third-party AI models and plugins
  • Detect behavioral anomalies in AI components from external sources
  • Apply vetting procedures before deploying marketplace AI tools
Coming Soon
Soon

AI Training Data Poisoning

Watch poisoned documents corrupt your AI's answers in real time.

  • Trace how manipulated documents alter AI-generated outputs
  • Identify signs of data poisoning in AI responses
  • Apply content integrity controls to knowledge base inputs
Coming Soon
Soon

Unsafe AI Output Handling

Exploit an AI whose outputs flow unchecked into live systems.

  • Identify injection risks when AI outputs feed into downstream systems
  • Trace how unsanitized AI output enables code execution
  • Apply output validation controls between AI and connected systems
Coming Soon
Soon

Over-Permissioned AI Agent

Manipulate an AI assistant into misusing its own permissions.

  • Identify excessive permissions granted to AI agents
  • Trace unauthorized actions performed by manipulated AI tools
  • Apply least-privilege principles to AI agent configurations
Coming Soon
Soon

AI System Prompt Extraction

Extract hidden instructions from a customer-facing AI chatbot.

  • Execute prompt extraction techniques against a live AI chatbot
  • Identify sensitive information exposed through leaked system prompts
  • Apply prompt hardening techniques to prevent system instruction disclosure
Coming Soon
Soon

RAG Pipeline Exploitation

Exploit a RAG pipeline to access documents beyond your clearance.

  • Identify access control failures in vector database retrieval
  • Trace how adversarial embeddings corrupt search results
  • Apply authorization checks at the retrieval layer of RAG systems
Coming Soon
Soon

AI Hallucination and Misinformation

Catch fabricated statistics and fake citations in an AI report.

  • Detect hallucinated facts and fabricated sources in AI outputs
  • Verify AI-generated claims against authoritative references
  • Apply fact-checking workflows to AI-assisted business content
Coming Soon
Soon

AI Denial-of-Service Attack

Launch a denial-of-wallet attack against an unprotected AI API.

  • Identify resource exhaustion vectors in AI API endpoints
  • Trace how crafted prompts escalate compute costs exponentially
  • Apply rate limiting and budget controls to AI service deployments
Coming Soon
Soon

AI Agent Goal Hijacking

Stop an autonomous AI agent from being redirected by a poisoned email containing hidden instructions.

  • Detect hidden instructions embedded in incoming data that redirect agent objectives
  • Trace how a goal-hijacked agent pivots from legitimate tasks to data exfiltration
  • Apply input validation strategies that prevent agents from treating data as instructions
Coming Soon
Soon

AI Agent Tool Exploitation

Prevent an AI agent from being manipulated into using its legitimate tools to delete files and send unauthorized messages.

  • Identify how ambiguous prompts cause agents to misuse legitimate tool access
  • Trace destructive tool calls triggered by manipulated input parameters
  • Apply least-privilege tool access policies to contain agent tool exploitation
Coming Soon
Soon

Agent Identity and Privilege Abuse

Prevent an AI agent from reusing inherited high-privilege credentials to access systems beyond its authorized scope.

  • Trace how agents inherit and propagate user credentials across different system contexts
  • Identify confused deputy vulnerabilities where agent privilege exceeds intended scope
  • Apply scoped credential delegation to prevent cross-context privilege escalation
Coming Soon
Soon

Agentic AI Supply Chain Attack

Investigate a backdoored third-party AI plugin that silently modifies agent behavior and exfiltrates sensitive data.

  • Detect behavioral anomalies indicating a compromised third-party AI component
  • Trace data exfiltration pathways through backdoored plugins and MCP servers
  • Apply supply chain verification practices before integrating external AI tools
Coming Soon
Soon

AI Agent Code Injection

Catch an AI coding assistant before it executes a shell script containing injected commands that compromise your system.

  • Detect injected commands hidden within AI-generated code and shell scripts
  • Trace how user input flows through code generation into unsandboxed execution
  • Apply code review and sandboxing practices to AI-generated scripts before execution
Coming Soon
Soon

AI Agent Memory Poisoning

Detect adversarial content injected into an AI agent's persistent memory that corrupts all future decisions.

  • Identify poisoned entries in an agent's persistent memory and retrieval context
  • Trace how corrupted memory influences downstream agent decisions across sessions
  • Apply memory integrity verification to detect and remove adversarial content
Coming Soon
Soon

Agent-to-Agent Communication Spoofing

Intercept and identify spoofed messages between AI agents in a multi-agent workflow before fabricated instructions cause damage.

  • Detect spoofed agent identities and fabricated messages in multi-agent communication channels
  • Trace how unauthenticated inter-agent messages enable man-in-the-middle attacks
  • Apply message authentication and agent identity verification to secure multi-agent systems
Coming Soon
Soon

Multi-Agent Cascading Failure

Contain a minor AI hallucination before it cascades through downstream agents into a catastrophic system-wide failure.

  • Trace error propagation from a single agent hallucination through multiple downstream systems
  • Identify amplification points where small errors compound into catastrophic outcomes
  • Apply circuit breaker patterns and human checkpoints to interrupt cascading agent failures
Coming Soon
Soon

Over-Trusting AI Agent Recommendations

Catch a series of compromised AI agent recommendations that exploit your trust to approve a fraudulent transfer and a backdoored code change.

  • Recognize automation bias patterns where consistent AI accuracy creates false confidence
  • Identify subtle anomalies in AI recommendations that indicate manipulation or compromise
  • Apply structured verification workflows that resist social engineering through AI interfaces
Coming Soon
Soon

Detecting a Rogue AI Agent

Investigate a compromised AI agent that appears functional while silently performing unauthorized actions and evading monitoring.

  • Detect covert unauthorized actions performed by an agent that appears to be operating normally
  • Trace persistence mechanisms that allow rogue agents to survive restarts and monitoring sweeps
  • Apply behavioral analysis and anomaly detection to distinguish rogue agents from legitimate ones
Coming Soon

OneNote Email Attack

Trace a real BEC scam built on weeks of inbox surveillance.

  • Detect lookalike domain invoice fraud
  • Spot signs of long-term email monitoring
Play Exercise

MGM Resorts Breach

Relive the 10-minute helpdesk call that cost $100M.

  • Recognize helpdesk vishing techniques
  • Understand Scattered Spider social engineering
  • Trace the path from phone call to ransomware
Play Exercise
Coming Soon

Free Exercise Builder

Create your own interactive cyber hygiene exercises. Build custom email security simulations, credential theft scenarios, and threat awareness training. All for free.

Drag & Drop No coding required
SCORM Export Works with any LMS
Forever Free Open for everyone

Why Free Security Awareness Training?

We believe everyone deserves access to quality employee cybersecurity training. These interactive cybersecurity simulations and security awareness exercises are our contribution to making the internet safer for individuals, small businesses, and organizations who can't afford expensive training platforms.

Built by RansomLeak with

Frequently Asked Questions

Common questions about our free cybersecurity training exercises.

Are these exercises really free?

Yes. Every exercise in our free library is fully playable with no sign-up, no email required, and no paywall. You get the same interactive 3D simulations used by enterprise customers.

The free library covers core attack types including phishing, ransomware, social engineering, vishing, smishing, and business email compromise. Enterprise features like analytics dashboards, SSO, and SCORM export require a paid plan.

Who are these free exercises for?

Anyone who wants to improve their cybersecurity awareness. Individuals building personal security skills, students studying cybersecurity, small business owners training their teams, and IT administrators evaluating our platform before purchasing.

No sign-up is required. Each exercise takes 5 to 10 minutes and covers topics from basic phishing detection to AI prompt injection and deepfake whaling.

How long does each exercise take?

Most exercises take 5 to 10 minutes. Each one uses an interactive 3D simulation where you face a realistic cybersecurity scenario and make decisions at key points.

Wrong choices trigger immediate corrective feedback explaining what went wrong and why. According to National Training Laboratories research, practice-by-doing achieves 75% knowledge retention compared to 5% for lectures.

Can I use these exercises for my organization?

Absolutely. Our enterprise platform adds analytics dashboards with completion tracking and performance metrics by department. Compliance reporting covers SOC 2, ISO 27001, and HIPAA.

All exercises export as SCORM 1.2 and 2004 packages for any compliant LMS. SSO, white-labeling, and team management are included.

What topics do the exercises cover?

Over 90 exercises spanning phishing, ransomware, social engineering, vishing, smishing, business email compromise, deepfake whaling, and USB drop attacks.

The AI security module covers prompt injection, AI-powered phishing, deepfake voice cloning, plus the OWASP Top 10 for LLM Applications and OWASP Top 10 for Agentic AI Applications. Privacy exercises address GDPR compliance, data subject access requests, breach notification, cross-border transfers, privacy impact assessments, and the OWASP Top 10 Privacy Risks. New exercises are added monthly as the threat landscape evolves.