Skip to main content
90+ Interactive Exercises

Security Training Catalogue

Interactive 3D exercises across phishing, GDPR compliance, OWASP Top 10 for LLM & Agentic AI, OWASP Privacy Risks, and real-world incident case studies. Free to play, no sign-up required.

Security Awareness

46 exercises · Build a security-first culture with interactive exercises covering phishing, social engineering, device security, and more.

Privacy & Compliance Frameworks

21 exercises · Master GDPR compliance with hands-on exercises covering data protection, breach response, and privacy by design.

AI & LLM Security

21 exercises · Prepare for AI-powered threats including prompt injection, deepfake attacks, and LLM manipulation.

Clawdbot (Moltbot) Prompt Injection

Stop an AI assistant from leaking data via hidden prompts.

  • Identify hidden instructions in documents
  • Prevent data exfiltration through AI tools
  • Recognize prompt injection patterns
Play Exercise
Soon

LLM Prompt Injection Attack

Stop a hidden prompt from hijacking your AI assistant mid-task.

  • Detect hidden instructions embedded in documents processed by AI
  • Trace how injected prompts override legitimate AI behavior
  • Apply safe document handling before feeding content to AI tools
Coming Soon
Soon

Sensitive Data Exposure Through AI

See what happens when confidential data enters a consumer AI tool.

  • Recognize sensitive data categories that should never enter AI prompts
  • Trace how pasted content persists in AI training data and logs
  • Apply data classification policies before using AI tools
Coming Soon
Soon

AI System Prompt Extraction

Extract hidden instructions from a customer-facing AI chatbot.

  • Execute prompt extraction techniques against a live AI chatbot
  • Identify sensitive information exposed through leaked system prompts
  • Apply prompt hardening techniques to prevent system instruction disclosure
Coming Soon
Soon

AI Agent Goal Hijacking

Stop an autonomous AI agent from being redirected by a poisoned email containing hidden instructions.

  • Detect hidden instructions embedded in incoming data that redirect agent objectives
  • Trace how a goal-hijacked agent pivots from legitimate tasks to data exfiltration
  • Apply input validation strategies that prevent agents from treating data as instructions
Coming Soon
Soon

Detecting a Rogue AI Agent

Investigate a compromised AI agent that appears functional while silently performing unauthorized actions and evading monitoring.

  • Detect covert unauthorized actions performed by an agent that appears to be operating normally
  • Trace persistence mechanisms that allow rogue agents to survive restarts and monitoring sweeps
  • Apply behavioral analysis and anomaly detection to distinguish rogue agents from legitimate ones
Coming Soon

Real-World Incidents

2 exercises · Learn from actual security breaches. Walk through the MGM Resorts attack, BEC fraud cases, and more.

What Is Security Awareness Training?

Security awareness training is a structured education program that teaches employees to recognize, avoid, and report cybersecurity threats in their daily work. Topics include phishing email detection, ransomware response, social engineering defense, password security, device protection, GDPR compliance, and AI-powered attack recognition.

RansomLeak delivers this training through interactive 3D simulations where employees practice inside realistic attack scenarios rather than watching passive videos.

This catalogue organizes 90+ free exercises into four categories: Security Awareness (46 exercises across 10 courses covering phishing, ransomware, social engineering, and more), Privacy and Compliance (21 exercises including GDPR and OWASP Top 10 Privacy Risks), AI and LLM Security (21 exercises covering the OWASP Top 10 for LLM Applications and Agentic AI), and Real-World Incidents (2 case studies from documented breaches). All exercises run in the browser with no sign-up required.

Deploy Training Across Your Organization

Analytics dashboards, SCORM export, SSO, custom branding, and compliance reporting for your organization.