🧠 Not sure where to start? Take the free Cyber IQ Quiz — find out your score and get a personalized mission plan.
16 MISSIONS · ISTE-ALIGNED · AGES 8–18

The Cybersecurity
Mission Library

Every mission is a real scenario, not a worksheet. Kids inspect phishing emails, detect AI deepfakes, battle malware, and earn badges along the way. No lectures. Just missions.

🎯 16 missions · 🏅 16 collectible badges · 📚 ISTE standards · 🤖 Cipher AI mentor
Age Band
Mission Type
Topic
#1
Quiz Mission
🔐

Password Fortress

Most kids use the same weak password everywhere. You're about to change that.

👤 Ages 8–12 Beginner
Identify what makes passwords strong or weak
Recognize common password mistakes like reuse and simple words
ISTE: Digital Citizen 2a · Digital Citizen 2b
#2
Quiz Mission
🎣

Phishing Pond

Scammers send 3.4 billion fake emails every day. Learn to spot every one.

👤 Ages 8–12 Beginner
Recognize phishing email tactics including urgency and fake authority
Identify suspicious sender domains and link destinations
ISTE: Digital Citizen 2c · Digital Citizen 2d
#3
Quiz Mission
🔏

Privacy Shield

You share more than you think. Here's how to take it back.

👤 Ages 8–12 Beginner
Understand what personal information should stay private online
Recognize how apps and websites collect data about users
ISTE: Digital Citizen 2b · Digital Citizen 2d
#4
Quiz Mission
🌐

Social Savvy

Every post is permanent. Every stranger has a motive. Are you ready?

👤 Ages 8–14 Beginner
Understand digital permanence — posts and messages can last forever
Recognize online stranger danger including catfishing tactics
ISTE: Digital Citizen 2a · Digital Citizen 2c
#5
Quiz Mission
🦠

Malware Maze

Viruses don't look like viruses. That's exactly the problem.

👤 Ages 10–14 Intermediate
Identify types of malware: viruses, ransomware, spyware, and trojans
Recognize warning signs of infected devices and suspicious downloads
ISTE: Digital Citizen 2a · Digital Citizen 2b
#6
Interactive Lab Try Free →
🕵️

Phishing Inbox Detective

Real phishing attacks — real consequences. Can you catch them all before you click?

👤 Ages 10–14 Intermediate
Analyze email sender fields to detect domain spoofing and typosquatting
Identify urgency and fear tactics used to manipulate victims
ISTE: Digital Citizen 2c · Digital Citizen 2d
#7
Interactive Lab
🔐

Password Fortress Interactive

5 challenges. A live entropy meter. No hints unless you earn them.

👤 Ages 10–14 Intermediate
Apply entropy and length concepts to build genuinely strong passwords
Recognize and avoid common password patterns that attackers exploit
ISTE: Digital Citizen 2a · Digital Citizen 2b
#8
Interactive Lab
🔑

Two-Factor Fortress

Even if your password leaks, 2FA keeps attackers out. Here's how.

👤 Ages 10–14 Intermediate
Understand how two-factor authentication protects accounts even after password leaks
Distinguish between SMS codes, authenticator apps, and hardware keys
ISTE: Digital Citizen 2a · Digital Citizen 2b
#9
Interactive Lab
📵

Scam Spotter

The IRS is NOT calling. Your warranty is NOT expiring. Let's prove it.

👤 Ages 10–14 Intermediate
Identify robocall and smishing scam scripts and the pressure tactics they use
Recognize government impersonation and tech support scam patterns
ISTE: Digital Citizen 2c · Digital Citizen 2d
#10
Interactive Lab
📍

Privacy Guardian

A photo of your lunch could reveal your home address. Here's why.

👤 Ages 10–14 Intermediate
Understand how geotagged photos can reveal precise location data
Audit and adjust social media privacy settings to protect personal information
ISTE: Digital Citizen 2b · Digital Citizen 2d
#11
Interactive Lab
🛡️

Cyberbullying Defender

60% of kids witness cyberbullying. Only 20% say something. Be the 20%.

👤 Ages 10–14 Intermediate
Identify cyberbullying patterns including exclusion, harassment, and impersonation
Choose effective bystander responses that de-escalate and support victims
ISTE: Digital Citizen 2a · Digital Citizen 2c
#12
Interactive Lab
🤖

AI & Deepfake Detective

AI can fake voices, faces, and entire conversations. Your eyes are not enough.

👤 Ages 12–18 Advanced
Identify visual artifacts in AI-generated images including finger anomalies and text rendering errors
Recognize voice clone patterns and apply call-back verification to confirm identity
ISTE: Digital Citizen 2c · Digital Citizen 2d · Knowledge Constructor 3b
#13
Interactive Lab
📡

Smart Device & Public Wi-Fi Defender

Every device in your home is a door. Most of them are unlocked by default.

👤 Ages 10–16 Advanced
Identify and remediate common security risks in smart home devices including default passwords, location sharing, and auto-accept settings
Distinguish legitimate Wi-Fi networks from evil-twin rogue hotspots using captive portal inspection and official signage verification
ISTE: Digital Citizen 2.2a · Computational Thinker 2.5a
#14
Interactive Lab
🪪

Identity Theft & Digital Footprint Defender

Strangers can piece together your school, birthday, hometown, and pet's name from one public profile. That's enough to take over your accounts.

👤 Ages 12–18 Advanced
Identify personal information visible on public social profiles that feeds identity theft and account takeover
Classify real-world identity theft attacks (phishing, smishing, FAFSA scams, fake job offers) and distinguish them from legitimate communications
ISTE: Digital Citizen 2.2b · Digital Citizen 2.3a · Knowledge Constructor 3.3a
#15
Interactive Lab
🎮

Gaming Safety Defender

The most dangerous person in your lobby isn't the one with the highest K/D ratio — it's the one who already knows your real name.

👤 Ages 8–16 Advanced
Evaluate incoming gaming friend requests by analyzing profile age, account age, mutual contacts, and message content to identify grooming and scam patterns
Identify manipulation tactics in in-game trades and fake currency offers including urgency, impersonation, off-platform links, and account-info requests
ISTE: Digital Citizen 2.2a · Digital Citizen 2.3a · Digital Citizen 2.4a
#16
Interactive Lab
🤖

Deepfake & AI Scam Defender

AI cloned your mom's voice from a TikTok. A celebrity endorses a crypto scam that never happened. A "new friend" online responds in 1 second at 3am and never makes typos. These aren't edge cases — they're the #1 emerging threat in 2025.

👤 Ages 10–18 Advanced
Identify the technical and behavioral tells of AI voice clone scam calls including urgency framing, untraceable payment requests, and "don't tell anyone" instructions
Classify short-form videos as real or AI-generated deepfakes by examining lip-sync timing, blink rate, face/neck lighting, ear artifacts, and scam hook patterns
ISTE: Digital Citizen 1.2.d · Knowledge Constructor 1.3.b
#17
Interactive Lab
📡

Smart Device & IoT Defender

The average home has 22 connected devices. Most still have their factory password: admin/admin. One compromised baby monitor can expose your entire network.

👤 Ages 10–18 Intermediate
Identify why default credentials are the #1 IoT attack vector and change them on 6 simulated smart device setup screens
Apply the principle of least privilege by auditing 8 smart speaker permissions and disabling microphone history, third-party skills, and voice purchasing
ISTE: Digital Citizen 1.2.d · Computational Thinker 2.5a
#24
🎮

Gaming Account Guardian

Gaming accounts get hacked more than bank accounts. Free Nitro, fake moderators, and V-bucks generators are all traps. Learn to spot every one.

👤 Ages 8–14 Intermediate
Recognize Discord DM scams including fake Nitro gift links with spoofed domains
Understand that legitimate game staff never ask for passwords through DMs
ISTE: Digital Citizen 2a · Digital Citizen 2b · Digital Citizen 2c
#25
Interactive Lab
🛡️

Two-Factor Titan

Someone just bought your leaked password for $2. They're credential stuffing it right now across 800 sites. The only thing standing between them and your accounts is 2FA. Do you have it set up right?

👤 Ages 10–18 Advanced
Understand why a strong password alone cannot stop a credential stuffing attack
Compare SMS vs TOTP authenticator vs passkey and explain why TOTP/passkeys resist SIM-swap attacks
ISTE: Digital Citizen 2a · Digital Citizen 2b · Digital Citizen 2d
#26
Interactive Lab
🧠

Social Engineering Sentinel

The IT help desk is calling. The substitute teacher knows too much. The lost delivery driver needs to be let inside. None of them are who they say they are.

👤 Ages 10–18 Advanced
Identify pretext attacks: fake IT help desk calls, authority impersonation, and urgency pressure
Recognize social engineering in physical environments including tailgating and inside-access cons
ISTE: Digital Citizen 2b · Digital Citizen 2c · Digital Citizen 2d
#32
Quiz Mission
👣

My Digital Footprint

When Pixel the Robot posted her lunch photo, it reached 500 kids in 10 minutes. The internet never forgets.

👤 Ages 5–8 Beginner
Explain what a digital footprint is in simple terms
Identify the difference between public and private information
ISTE: Digital Citizen 2b
#33
Quiz Mission
🔑

Safe Passwords for Kids

Kali the Cyber Cat used "cat" as her password. A hacker guessed it in one second. Help her fix it.

👤 Ages 5–8 Beginner
Identify characteristics of a strong password (long, surprising, mixed characters)
Apply the Picture Password Trick to create a memorable strong password
ISTE: Digital Citizen 2b
#34
Quiz Mission
🙋

Ask a Grown-Up First

Zoom the Cyber Puppy saw a pop-up saying he won a free tablet. Should he click it? Help Zoom make the right call.

👤 Ages 5–8 Beginner
Identify three situations that require asking a grown-up (pop-ups, downloads, stranger messages)
Apply the Ask-First rule before clicking unfamiliar things online
ISTE: Digital Citizen 2a · Digital Citizen 2c
#35
Interactive Lab
🔍

The App Permission Detective

A flashlight app wants access to your contacts. A calculator wants your camera. Time to crack the case.

👤 Ages 8–11 Intermediate
Explain what app permissions are and why apps request them
Evaluate whether a permission request matches the app's stated function
ISTE: Digital Citizen 2b · Digital Citizen 2d
#36
Interactive Lab
📰

Fact or Fake: News Detective

"Scientists Discover Chocolate Makes Kids 10x Smarter!" — should you believe it, share it, or investigate it?

👤 Ages 8–11 Intermediate
Identify clickbait headline characteristics: emotional language, ALL CAPS, exaggerated claims
Evaluate source credibility by checking author name, publication, and website domain
ISTE: Digital Citizen 2c · Digital Citizen 2d

Try one free — no signup, no credit card.

Play the full Phishing Inbox Detective mission right now. 5 minutes. No account needed.

Start the Free Mission →
🤖
BUILT INTO EVERY MISSION

Meet Cipher, your AI cyber mentor

Every mission includes Cipher — an AI mentor that watches your progress. When you're stuck, Cipher offers a nudge. Make a wrong choice, and Cipher explains the real-world consequences. Finish the mission, and Cipher writes you a personalized performance debrief. Not canned responses — actual analysis of what you got right and what to study next.

Unlock all 16 missions today

Family plan unlocks everything. Educators get a free pilot for their classroom. No setup. No software to install.