What your child will learn
Recognize phishing email tactics including urgency and fake authority
Identify suspicious sender domains and link destinations
Understand how to verify the legitimacy of online requests
How this mission works
Students answer 5 quiz questions about phishing email patterns, social engineering psychology, and how to verify suspicious requests. Builds the mental models needed before tackling the full interactive Phishing Inbox mission.
What students actually encounter
An email says your PayPal account will be closed in 24 hours — what do you do?
How can you check if a link is safe without clicking it?
Cipher is with them the whole way
When a student gets stuck on Phishing Pond, Cipher appears with a mission-specific nudge — no spoilers, just a hint toward the right thinking. Make a wrong choice, and Cipher explains the real-world consequence. Finish the mission, and Cipher generates a personalized performance debrief based on exactly how the student played it.
ISTE alignment
Students demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property, and manage their personal data to maintain digital privacy.