3.5 million unfilled cybersecurity jobs by 2025. Your students need these skills. CyberHeroesHQ makes it engaging, measurable, and ISTE-aligned — so you can actually prove it worked.
Sign up for free, create a classroom, and get a unique 4-character join code instantly — like CYBER-X7K2. Print it or share it digitally.
Students create their hero identity — a username, emoji avatar, and optional classroom code. No email required. No parent consent friction.
Your teacher dashboard shows every student's XP, mission completion, badges earned, and a per-mission progress report with most-missed questions. CSV export included.
CyberHeroesHQ automatically administers a 15-question cybersecurity diagnostic before students start missions — and the same test again after they complete 5+. The result is a verified before/after score your principal can take to the school board.
Students analyze 8 realistic emails — legitimate and phishing — making Trust/Report decisions with instant feedback. Server-side grading means answers are never exposed in the client.
Real-time roster with XP, level, mission completion, and badges per student. CSV export for gradebooks.
Per-mission completion bars and most-missed questions surface exactly where students are struggling.
23 earnable badges tied to mission completions. Students collect all of them across the curriculum.
No other K-12 curriculum offers what comes after the missions. Three 40–50 minute labs where students work with real systems — not simulated quizzes.
The Competition Arena brings competitive pressure to cybersecurity training — live bracket matches and async seasonal competitions where schools compete on mission completions, lab scores, and daily challenge streaks.
Cipher — the platform's AI mentor — doesn't just answer questions. It tracks each student's knowledge gaps across missions and adapts hints, difficulty, and debrief depth in real time. Every student gets a personalized experience.
We don't oversell. Here's what's shipped, what's coming soon, and what we're honest about not having yet.
Every other tool in this space is a PDF worksheet or an unmonitored game. We give teachers a real dashboard: roster, XP, mission progress, most-missed questions, CSV export.
Per-mission scores, attempt tracking, and progress reports per class. You can actually demonstrate to an administrator that students completed the curriculum.
Not a quiz about phishing — an actual simulated inbox with 8 realistic emails. Students make Trust/Report decisions with instant explanations. The kind of practice that builds real instincts.
Students use a username and emoji avatar. No email, no real name, no password — nothing that requires a COPPA consent workflow or puts student data at risk.
Teacher signs up, creates a classroom, shares a 4-character code. Students join from any device with a browser. No app install, no IT ticket, no 30-minute setup session.
Kids encounter AI-generated images, voice clones, and IoT attack surfaces daily. Missions #12 and #13 teach them to spot AI artifacts, verify voice calls, audit smart home devices, and navigate public Wi-Fi safely. No competitor in K-12 cyber covers this at this depth.
Current missions target grades 5–9. We're building age-appropriate content for younger learners — simpler scenarios, larger text, more scaffolding.
Connecting cybersecurity skills to real careers: SOC analyst, penetration tester, security engineer. Age-appropriate profiles with day-in-the-life scenarios.
CyberHeroesHQ missions are designed to meet ISTE Standards for Students — specifically the Digital Citizen and Empowered Learner standards.
| Mission | ISTE Standard | Strand | Key Skills |
|---|---|---|---|
| Password Fortress | 2c · Digital Citizen | Digital Identity & Security | Password strength, credential hygiene, account protection |
| Phishing Pond | 2b · Digital Citizen | Safe & Ethical Online Behavior | Recognizing deceptive messages, verifying sender identity |
| Privacy Shield | 2a · Digital Citizen | Privacy & Data Literacy | Personal data classification, permission management, oversharing risks |
| Social Savvy | 2b · Digital Citizen | Digital Footprint & Reputation | Social media privacy settings, permanence of posts, contact vetting |
| Malware Maze | 2c · Digital Citizen | Device & System Security | Malware types, attack vectors, safe download practices |
| Phishing Inbox: Detective Mode | 2b · Digital Citizen | Critical Evaluation of Information | Sender domain verification, link inspection, urgency manipulation tactics |
| Password Fortress: Interactive | 2c · Digital Citizen | Digital Identity & Security | Password entropy, passphrase construction, credential hygiene challenges |
| Two-Factor Fortress | 2c · Digital Citizen | Digital Identity & Security | MFA methods, authenticator apps, SIM-swap attack defense |
| Scam Spotter | 2b · Digital Citizen | Safe & Ethical Online Behavior | Robocall recognition, SMS phishing classification, high-pressure tactics |
| Privacy Guardian | 2a · Digital Citizen | Privacy & Data Literacy | Geolocation risks, social profile auditing, stranger-DM danger signals |
| Cyberbullying Defender | 2b · Digital Citizen | Safe & Ethical Online Behavior | Cyberbullying pattern recognition, bystander intervention, platform reporting & blocking procedures |
| AI & Deepfake Detective | 2d · Digital Citizen | Digital Safety & Media Literacy | AI image detection, voice clone awareness, chatbot manipulation recognition, safe verification habits |
| Smart Device & Wi-Fi Defender | 2.2a · Digital Citizen & 2.5a Computational Thinker | IoT Security & Network Safety | Smart device auditing, default password risks, evil-twin Wi-Fi detection, smart speaker eavesdrop awareness |
| Password Power-Up: Passphrases, 2FA & Credential Hygiene NEW | 2.2a · Digital Citizen & CSTA NI-3A-7 Network Security | Password Security & Two-Factor Authentication | Passphrase construction, crack-time analysis, credential stuffing defence, SMS vs TOTP vs hardware-key 2FA comparison, 2FA bypass attack identification, password manager vault setup |
| Bully Block: Stopping Cyberbullying NEW | 2.2b · Digital Citizen (Safe & Ethical) · CASEL Social Awareness & Relationship Skills | Cyberbullying Prevention & Upstander Identity | Harassment vs banter classification, bystander choice outcomes, screenshot-block-report sequence, peer support writing, anonymous account escalation protocol |
ISTE Standards for Students, 2016 framework. Full alignment documentation available on request.
2025–2026 school year
After pilot period
Pilot participants lock in a discount rate at the end of the pilot year.
Fill in the form and we'll be in touch within 1 business day to schedule a walkthrough and set up your first classroom.
8+ states added K-12 cybersecurity mandates in 2023–24. We've pre-built alignment documents for 10 mandate states — specific framework codes mapped to each of our 23 missions.