Lab Orientation
40–70 minutesComplete the activities in order. Your score is tracked locally in the browser (no data is sent anywhere).
Activity 1 — Build the Asset–Threat–Vulnerability–Risk–Control Chain
15 minutes • 20 ptsUse the scenario to identify elements and explain the chain.
A shared file repository contains sensitive client documents. Access is broad, patching is irregular, and ownership is unclear.
Activity 2 — Classify Controls (Category & Type)
10 minutes • 15 ptsClassify at least 8 controls by category (technical/managerial/operational/physical) and type (preventive/detective/corrective/etc.).
Activity 3 — Vulnerability Lifecycle Mapping
10 minutes • 10 ptsMap how one vulnerability moves through: identification → analysis → prioritization → remediation → verification → reporting → continuous monitoring.
Activity 4 — Threat Modelling (Conceptual)
10 minutes • 10 ptsIdentify threat actors, vectors, and attack surface for the scenario in Activity 1.
Activity 5 — Systemic View
10 minutes • 10 ptsExplain feedback loops: how controls change risk, how monitoring feeds back into vulnerability management.
Completion
Wrap‑upDiscuss: Which element (asset, vulnerability, threat, control) is most often misunderstood in your organization?