SIM ACTIVE
TechSolutions Inc.
W. Conway · IT Security Analyst
⚠ ASSESSMENT: HIGH RISK
Module 01 — Breach Simulation
MFA Attack Simulator
Simulate real-world credential attacks and observe how MFA blocks or allows each attempt — based on TechSolutions Inc.'s actual vulnerability analysis.
// NEXUS Security Simulation Engine v2.6
// TechSolutions Inc. — Authentication Framework
// Select attack type and MFA status, then RUN ATTACK
nexus@sim:~$
Attack History
// No attacks run yet
0
BLOCKED
0
BREACHED
0
TOTAL
MFA Effectiveness Matrix
ATTACKNONETOTPFIDO2BIO Phishing~ Brute Force Cred Stuffing Insider Anomalous~~
✓=Blocked  ~=Partial  ✗=Breached
Module 02 — Access Policy Designer
Resource Access Control
Assign the correct MFA level to each of TechSolutions Inc.'s 8 systems. Scored against the assessment recommendations — can you get a perfect score?
Module 03 — Physical Security Audit
Physical Security Map
Click any area of the TechSolutions Inc. floor plan to inspect vulnerabilities, risk level, and remediation steps from the security assessment.
Critical
High
Medium
Low
Vulnerability Index — Click to inspect

Module 04 — Visitor Management Simulation
Visitor Check-In Flow
Step through the redesigned visitor management protocol for TechSolutions Inc. Make security decisions at each gate to practice correct procedures.
← Select a visitor from the queue to begin
// Visitor management log — start a simulation...
Today's Visitor Queue
Badge Type Reference
WHITEOne-day visitor (escort required) YELLOWMulti-day visitor (limited RFID) ORANGEShort-term contractor BLUELong-term contractor REDEmergency services only
Module 05 — Implementation Tracker
MFA Rollout Dashboard
Track TechSolutions Inc.'s 5-phase MFA implementation. Advance the timeline to see enrollment progress across all departments and systems.
Week 0 / 12