🛡️ Two-Factor Titan +175 XP · 🛡️ Two-Factor Titan
Interactive Lab Advanced Ages 10–18

🛡️ Two-Factor Titan

Credential stuffing, SIM-swap attacks, MFA fatigue, and recovery codes — master every layer

"Someone just bought your leaked password for $2. They're credential stuffing it right now across 800 sites. The only thing standing between them and your accounts is 2FA. Do you have it set up right?"

🛡️
Two-Factor Titan Badge
Earned on completion
+175 XP
📜 Certificate included
PREVIEW
🛡️
Badge Unlocked
Two-Factor Titan
Two-Factor Titan
+175 XP · Ages 10–18
📜 Shareable certificate included
LEARNING OBJECTIVES

What your child will learn

Understand why a strong password alone cannot stop a credential stuffing attack

Compare SMS vs TOTP authenticator vs passkey and explain why TOTP/passkeys resist SIM-swap attacks

Walk through the full setup flow of enabling an authenticator app (QR scan → TOTP entry → confirmation)

Recognize an MFA fatigue (push-bombing) attack and respond correctly by denying all requests and changing password

Identify the safest storage methods for 2FA recovery codes and explain why screenshots and email are insecure

MISSION OVERVIEW

How this mission works

A 5-scene deep dive into 2FA and account takeover defense. Scene 1: Watch a credential stuffing attack stopped cold by 2FA — the attacker has the correct password but cannot produce the TOTP code. Scene 2: Compare SMS vs authenticator app vs passkey during a live SIM-swap attack to understand which 2FA methods are SIM-swap-proof. Scene 3: Walk through the complete authenticator app setup flow — scan a QR code, enter a 6-digit TOTP, confirm the link. Scene 4: Survive a 3am MFA fatigue push-bombing attack — identify the pattern and respond correctly. Scene 5: Store recovery codes securely and prove you can recover your account when your phone is lost.

SAMPLE SCENARIOS

What students actually encounter

🎯

An attacker has your leaked password from a data breach. They enter it at your email login — and get blocked. Why?

🎯

A SIM-swap attack transfers your phone number to the attacker. Which 2FA method is still safe: SMS, TOTP app, or passkey?

🎯

It's 3:17 AM and you receive 5 consecutive push approval requests you didn't initiate. What kind of attack is this and what do you do?

🤖
AI MENTOR

Cipher is with them the whole way

When a student gets stuck on Two-Factor Titan, Cipher appears with a mission-specific nudge — no spoilers, just a hint toward the right thinking. Make a wrong choice, and Cipher explains the real-world consequence. Finish the mission, and Cipher generates a personalized performance debrief based on exactly how the student played it.

💡 3-tier hints (nudge → teach → reveal)
🎯 Wrong-answer concept explanations
📊 Personalized debrief on completion
⏱️ Auto-triggers after 30 seconds idle
STANDARDS ALIGNMENT

ISTE alignment

ISTE Digital Citizen 2a, 2b & 2d

Students demonstrate tangible cybersecurity practices by configuring two-factor authentication and managing recovery codes (2a); safe behaviors against credential stuffing and MFA fatigue attacks (2b); and recognize cyber threats to individuals including SIM-swap attacks and push-bombing (2d).

Digital Citizen 2a Digital Citizen 2b Digital Citizen 2d

Ready to start Two-Factor Titan?

Unlock all 16 missions with a Family Plan. Educators get a free pilot for their entire classroom.