📋 K-12 Cybersecurity Standards Alignment

Every standard. Every mission.
Procurement-ready.

All 18 CyberHeroesHQ missions mapped to ISTE, CSTA K-12, CISA GenCyber, NICE Framework, Common Sense Digital Citizenship, and 10 state mandates — with specific standard codes, grade bands, and the exact mission scene that hits each objective.

📊 District ROI Calculator
18
Missions
5
National Frameworks
10
State Mandates
90%+
Avg Coverage

National Framework Crosswalk

Filter by framework to see exactly which standard codes each of the 18 missions covers. ISTE and CSTA are shown by default — click any badge to toggle.

Show frameworks:
🎓
ISTE Standards for Students (2016) — Digital Citizen Strand 2.2
2.2a: Advocate for safe/legal digital behaviors · 2.2b: Manage digital footprint/reputation · 2.2c: Protect personal data and digital identity · 2.2d: Recognize threats and be responsible digital citizen
Mission ISTE Codes What's Covered
🔐
Password Fortress
Ages 8–12
ISTE 2.2a ISTE 2.2b
Passwords and account protection — tangible benefits of cybersecurity practices (2.2a); safe/legal digital behaviors (2.2b)
🎣
Phishing Pond
Ages 8–12
ISTE 2.2b ISTE 2.2c
Phishing recognition — safe online behaviors (2.2b); managing personal information to protect digital privacy (2.2c)
🔏
Privacy Shield
Ages 8–12
ISTE 2.2b ISTE 2.2c
Privacy Shield — digital footprint awareness and personal data protection (2.2b, 2.2c)
🌐
Social Savvy
Ages 8–14
ISTE 2.2a ISTE 2.2b
Social Savvy — understanding how digital actions impact reputation (2.2a); safe social media behaviors (2.2b)
🦠
Malware Maze
Ages 10–14
ISTE 2.2a ISTE 2.2b
Malware Maze — risks of technology including malware (2.2a); safe digital practices (2.2b)
🕵️
Phishing Inbox Detective
Ages 10–14
ISTE 2.2b ISTE 2.2c ISTE 2.2d
Phishing Inbox Detective — safe behaviors (2.2b); protecting digital identity (2.2c); cyber threats to individuals (2.2d)
🔐
Password Fortress Interactive
Ages 10–14
ISTE 2.2a ISTE 2.2b
Password Fortress Interactive — active cybersecurity practices (2.2a); strong credential behaviors (2.2b)
🔑
Two-Factor Fortress
Ages 10–14
ISTE 2.2a ISTE 2.2b ISTE 2.2d
Two-Factor Fortress — MFA as cybersecurity action (2.2a); safe account habits (2.2b); SIM-swap threats (2.2d)
📵
Scam Spotter
Ages 10–14
ISTE 2.2b ISTE 2.2d
Scam Spotter — safe behaviors around phone scams (2.2b); cyber threats and social engineering (2.2d)
📍
Privacy Guardian
Ages 10–14
ISTE 2.2b ISTE 2.2c
Privacy Guardian — managing personal info online (2.2c); photo geolocation and privacy risks (2.2b)
🛡️
Cyberbullying Defender
Ages 10–14
ISTE 2.2a ISTE 2.2b ISTE 2.2d
Cyberbullying Defender — online community impact (2.2a); safe interactions (2.2b); cyber threats to wellbeing (2.2d)
🤖
AI & Deepfake Detective
Ages 12–18
ISTE 2.2b ISTE 2.2c ISTE 2.2d
AI & Deepfake Detective — synthetic media as cyber threat (2.2d); protecting identity online (2.2c); safe digital behaviors (2.2b)
📡
Smart Device & Public Wi-Fi Defender
Ages 10–16
ISTE 2.2a ISTE 2.2b ISTE 2.2d
Smart Device & Wi-Fi Defender — IoT risks (2.2a); safe device behaviors (2.2b); network-based threats (2.2d)
🪪
Identity Theft & Digital Footprint Defender
Ages 12–18
ISTE 2.2b ISTE 2.2c ISTE 2.2d
Identity Theft Defender — protecting personal data (2.2c); identity-based cyber threats (2.2d); safe digital practices (2.2b)
🎮
Gaming Safety Defender
Ages 8–16
ISTE 2.2a ISTE 2.2b ISTE 2.2d
Gaming Safety Defender — online gaming risks (2.2a, 2.2d); safe gaming behaviors (2.2b)
🤖
Deepfake & AI Scam Defender
Ages 10–18
ISTE 2.2b ISTE 2.2c ISTE 2.2d
Deepfake & AI Scam Defender — AI-based cyber threats (2.2d); protecting digital identity (2.2c); safe verification behaviors (2.2b)
📡
Smart Device & IoT Defender
Ages 10–18
ISTE 2.2a ISTE 2.2b ISTE 2.2d
Smart Device & IoT Defender — IoT security practices (2.2a, 2.2b); connected device threats (2.2d)
🔍
Synthetic Media Detective
Ages 12–18
ISTE 2.2b ISTE 2.2c ISTE 2.2d
Synthetic Media Detective — evaluating synthetic media (2.2d); protecting digital identity from AI manipulation (2.2c); safe media behaviors (2.2b)
🤖
Mind Games: Outsmarting AI Tricksters
Ages 12–18
ISTE 1.2a ISTE 2.2b ISTE 2.2d
Mind Games: Outsmarting AI Tricksters — critical evaluation of AI tools and chatbots (1.2a); identifying prompt injection and sycophantic AI behaviour (2.2d); protecting digital identity from AI-generated threats (2.2b)
💜
Bully Block: Stopping Cyberbullying
Ages 8–18
ISTE 2.2b ISTE 2.2d
Bully Block — safe and ethical online behavior and bystander responsibility (2.2b); cyber threats to individual wellbeing including harassment and anonymous accounts (2.2d); CASEL Social Awareness and Relationship Skills
🛡️
Two-Factor Titan
Ages 10–18
ISTE 2.2a ISTE 2.2b ISTE 2.2d
Two-Factor Titan — MFA and 2FA as essential cybersecurity practices (2.2a); safe account authentication behaviors (2.2b); credential stuffing, SIM-swap, and MFA fatigue as cyber threats (2.2d)
🧠
Social Engineering Sentinel
Ages 10–18
ISTE 2.2b ISTE 2.2c ISTE 2.2d
Social Engineering Sentinel — safe behaviors when facing pretext calls and impersonation attacks (2.2b); protecting personal identity from authority manipulation (2.2c); recognizing social engineering as a cyber threat vector including vishing, tailgating, and multi-vector con artists (2.2d)
💻
CSTA K-12 Computer Science Standards — NI & IC Strands
Networks & Internet (NI-2-6, NI-2-7, NI-3A-*) · Impacts of Computing (IC-2-4, IC-2-5, IC-3A-5, IC-3B-4)
Mission CSTA Codes What's Covered
🔐
Password Fortress
Ages 8–12
NI-2-6 NI-2-7 IC-2-4
Password Fortress — encryption concepts (NI-2-6); safe credential practices (NI-2-7); cybersecurity ethics (IC-2-4)
🎣
Phishing Pond
Ages 8–12
NI-2-7 IC-2-4 IC-3B-4
Phishing Pond — social engineering defense (NI-2-7); phishing as computing impact (IC-2-4); advanced threat analysis (IC-3B-4)
🔏
Privacy Shield
Ages 8–12
IC-2-4 IC-2-5 NI-2-6
Privacy Shield — privacy and personal data (IC-2-4, IC-2-5); digital data protection (NI-2-6)
🌐
Social Savvy
Ages 8–14
IC-2-4 IC-2-5
Social Savvy — digital citizenship and online identity (IC-2-4); societal impacts of computing (IC-2-5)
🦠
Malware Maze
Ages 10–14
NI-2-7 NI-3A-7 IC-2-4
Malware Maze — malware and network threats (NI-2-7); advanced network security (NI-3A-7); computing risks (IC-2-4)
🕵️
Phishing Inbox Detective
Ages 10–14
NI-2-7 NI-3A-7 IC-3B-4
Phishing Inbox Detective — advanced phishing simulation (NI-3A-7); threat analysis (IC-3B-4); safe behaviors (NI-2-7)
🔐
Password Fortress Interactive
Ages 10–14
NI-2-6 NI-2-7 NI-3A-6
Password Fortress Interactive — encryption and entropy (NI-2-6, NI-3A-6); authentication practice (NI-2-7)
🔑
Two-Factor Fortress
Ages 10–14
NI-2-7 NI-3A-6 NI-3A-7
Two-Factor Fortress — MFA implementation (NI-3A-6); authentication threats (NI-3A-7); safe access (NI-2-7)
📵
Scam Spotter
Ages 10–14
NI-2-7 IC-2-4 IC-3B-4
Scam Spotter — social engineering and phone-based threats (NI-2-7); computing impacts (IC-2-4); advanced analysis (IC-3B-4)
📍
Privacy Guardian
Ages 10–14
IC-2-4 IC-2-5 IC-3B-4
Privacy Guardian — privacy protection (IC-2-4, IC-2-5); advanced digital citizenship (IC-3B-4)
🛡️
Cyberbullying Defender
Ages 10–14
IC-2-4 IC-2-5 IC-3A-5
Cyberbullying Defender — computing impacts on individuals (IC-2-4); community impacts (IC-2-5); inclusive communities (IC-3A-5)
🤖
AI & Deepfake Detective
Ages 12–18
IC-3B-4 NI-3A-7 IC-2-4
AI & Deepfake Detective — advanced threats from computing (IC-3B-4); AI network threats (NI-3A-7); computing risks (IC-2-4)
📡
Smart Device & Public Wi-Fi Defender
Ages 10–16
NI-2-7 NI-3A-7 NI-3A-6
Smart Device & Wi-Fi Defender — IoT and network security (NI-2-7, NI-3A-7); cryptography in practice (NI-3A-6)
🪪
Identity Theft & Digital Footprint Defender
Ages 12–18
IC-2-4 IC-3B-4 NI-3A-7
Identity Theft Defender — identity privacy (IC-2-4); advanced identity threats (IC-3B-4); network-based attacks (NI-3A-7)
🎮
Gaming Safety Defender
Ages 8–16
IC-2-4 IC-2-5 NI-2-7
Gaming Safety Defender — online safety in games (IC-2-4, IC-2-5); gaming network threats (NI-2-7)
🤖
Deepfake & AI Scam Defender
Ages 10–18
IC-3B-4 NI-3A-7 IC-2-4
Deepfake & AI Scam Defender — AI-generated threats (IC-3B-4); network-based AI scams (NI-3A-7); defense behaviors (IC-2-4)
📡
Smart Device & IoT Defender
Ages 10–18
NI-3A-6 NI-3A-7 IC-3B-4
Smart Device & IoT Defender — IoT encryption (NI-3A-6); IoT threat vectors (NI-3A-7); emerging tech risks (IC-3B-4)
🔍
Synthetic Media Detective
Ages 12–18
IC-3B-4 NI-3A-7 IC-2-5
Synthetic Media Detective — synthetic media as computing threat (IC-3B-4); AI network risks (NI-3A-7); societal impacts (IC-2-5)
🤖
Mind Games: Outsmarting AI Tricksters
Ages 12–18
IC-3A-5 DA-3A-4 CS-3A-4
Mind Games — responsible use of AI tools (IC-3A-5); evaluating AI-generated data authenticity (DA-3A-4); understanding automated system vulnerabilities like prompt injection (CS-3A-4)
💜
Bully Block: Stopping Cyberbullying
Ages 8–18
IC-2-4 IC-2-5 IC-3A-5
Bully Block — impacts of computing on individuals and communities (IC-2-4, IC-2-5); fostering inclusive and safe computing communities (IC-3A-5); upstander identity and harassment documentation protocol
🛡️
Two-Factor Titan
Ages 10–18
NI-2-7 NI-3A-6 NI-3A-7
Two-Factor Titan — multi-factor authentication implementation (NI-3A-6); authentication threat modeling including SIM-swap and credential stuffing (NI-3A-7); safe access control behaviors (NI-2-7)
🧠
Social Engineering Sentinel
Ages 10–18
NI-2-7 IC-2-4 IC-3B-4
Social Engineering Sentinel — social engineering as a network and human-layer threat (NI-2-7); computing impacts from manipulation attacks on individuals (IC-2-4); advanced threat analysis of multi-vector social engineering combining pretext, authority, and isolation (IC-3B-4)

📄 Download the complete alignment packet

Cover page, full ISTE crosswalk, your state's alignment table, and a pilot CTA — ready for curriculum committee review and school board presentations.

State Mandate Alignments

Each state page shows the full per-mission table with that state's framework codes, grade bands, and the specific scenes that hit each objective.

🌴
Florida
HB 379 (2023)

Florida NGSSS Computer Science & Digital Citizenship Standards

✓ All 18 missions mapped View →
🗽
New York
NYS Education Law §805-b

NY K-12 Computer Science & Digital Fluency Standards (2020)

✓ All 18 missions mapped View →
🏙️
Illinois
PA 102-0746

Illinois Learning Standards for Computer Science (2022)

✓ All 18 missions mapped View →
Texas
SB 2065 (2023)

Texas Essential Knowledge and Skills — Technology Applications (TEKS)

✓ All 18 missions mapped View →
🌊
California
AB 272 / Ed Code §49073.6

California Computer Science Standards (2018) + Digital Citizenship Framework

✓ All 18 missions mapped View →
🔔
Pennsylvania
Chapter 4 Academic Standards

Pennsylvania Academic Standards for Computer Science and Information Technology (2022)

✓ All 18 missions mapped View →
🔴
Ohio
ORC §3301.079

Ohio Computer Science Standards (2022) + Digital Wellness and Safety

✓ All 18 missions mapped View →
🍑
Georgia
HB 446 (2022)

Georgia K-12 Computer Science Standards (2021)

✓ All 18 missions mapped View →
🌲
North Carolina
NCGS §115C-81.67

NC K-12 Computer Science and Digital Learning Plan (2022)

✓ All 18 missions mapped View →
🏛️
Virginia
HB 1833 (2023)

Virginia Computer Science Standards of Learning (2017, revised 2022)

✓ All 18 missions mapped View →
🌵
Arizona
AZ CS Standards (Oct 2018) + AZ Ed Tech Standards (2022)

Arizona K-12 Computer Science Standards (2018) + ADE Educational Technology Standards (2022 / ISTE)

✓ All 18 missions mapped View →

Don't see your state?

We're adding new state alignments every quarter. Start a free pilot and we'll send the alignment document for your state within 5 business days.

Start a Free 30-Day Pilot District Decision-Maker Pack →