All 18 CyberHeroesHQ missions mapped to ISTE, CSTA K-12, CISA GenCyber, NICE Framework, Common Sense Digital Citizenship, and 10 state mandates — with specific standard codes, grade bands, and the exact mission scene that hits each objective.
Filter by framework to see exactly which standard codes each of the 18 missions covers. ISTE and CSTA are shown by default — click any badge to toggle.
| Mission | ISTE Codes | What's Covered |
|---|---|---|
|
Password Fortress
Ages 8–12
|
Passwords and account protection — tangible benefits of cybersecurity practices (2.2a); safe/legal digital behaviors (2.2b) | |
|
Phishing Pond
Ages 8–12
|
Phishing recognition — safe online behaviors (2.2b); managing personal information to protect digital privacy (2.2c) | |
|
Privacy Shield
Ages 8–12
|
Privacy Shield — digital footprint awareness and personal data protection (2.2b, 2.2c) | |
|
Social Savvy
Ages 8–14
|
Social Savvy — understanding how digital actions impact reputation (2.2a); safe social media behaviors (2.2b) | |
|
Malware Maze
Ages 10–14
|
Malware Maze — risks of technology including malware (2.2a); safe digital practices (2.2b) | |
|
Phishing Inbox Detective
Ages 10–14
|
Phishing Inbox Detective — safe behaviors (2.2b); protecting digital identity (2.2c); cyber threats to individuals (2.2d) | |
|
Password Fortress Interactive
Ages 10–14
|
Password Fortress Interactive — active cybersecurity practices (2.2a); strong credential behaviors (2.2b) | |
|
Two-Factor Fortress
Ages 10–14
|
Two-Factor Fortress — MFA as cybersecurity action (2.2a); safe account habits (2.2b); SIM-swap threats (2.2d) | |
|
Scam Spotter
Ages 10–14
|
Scam Spotter — safe behaviors around phone scams (2.2b); cyber threats and social engineering (2.2d) | |
|
Privacy Guardian
Ages 10–14
|
Privacy Guardian — managing personal info online (2.2c); photo geolocation and privacy risks (2.2b) | |
|
Cyberbullying Defender
Ages 10–14
|
Cyberbullying Defender — online community impact (2.2a); safe interactions (2.2b); cyber threats to wellbeing (2.2d) | |
|
AI & Deepfake Detective
Ages 12–18
|
AI & Deepfake Detective — synthetic media as cyber threat (2.2d); protecting identity online (2.2c); safe digital behaviors (2.2b) | |
|
Smart Device & Public Wi-Fi Defender
Ages 10–16
|
Smart Device & Wi-Fi Defender — IoT risks (2.2a); safe device behaviors (2.2b); network-based threats (2.2d) | |
|
Identity Theft & Digital Footprint Defender
Ages 12–18
|
Identity Theft Defender — protecting personal data (2.2c); identity-based cyber threats (2.2d); safe digital practices (2.2b) | |
|
Gaming Safety Defender
Ages 8–16
|
Gaming Safety Defender — online gaming risks (2.2a, 2.2d); safe gaming behaviors (2.2b) | |
|
Deepfake & AI Scam Defender
Ages 10–18
|
Deepfake & AI Scam Defender — AI-based cyber threats (2.2d); protecting digital identity (2.2c); safe verification behaviors (2.2b) | |
|
Smart Device & IoT Defender
Ages 10–18
|
Smart Device & IoT Defender — IoT security practices (2.2a, 2.2b); connected device threats (2.2d) | |
|
Synthetic Media Detective
Ages 12–18
|
Synthetic Media Detective — evaluating synthetic media (2.2d); protecting digital identity from AI manipulation (2.2c); safe media behaviors (2.2b) | |
|
Mind Games: Outsmarting AI Tricksters
Ages 12–18
|
Mind Games: Outsmarting AI Tricksters — critical evaluation of AI tools and chatbots (1.2a); identifying prompt injection and sycophantic AI behaviour (2.2d); protecting digital identity from AI-generated threats (2.2b) | |
|
Bully Block: Stopping Cyberbullying
Ages 8–18
|
Bully Block — safe and ethical online behavior and bystander responsibility (2.2b); cyber threats to individual wellbeing including harassment and anonymous accounts (2.2d); CASEL Social Awareness and Relationship Skills | |
|
Two-Factor Titan
Ages 10–18
|
Two-Factor Titan — MFA and 2FA as essential cybersecurity practices (2.2a); safe account authentication behaviors (2.2b); credential stuffing, SIM-swap, and MFA fatigue as cyber threats (2.2d) | |
|
Social Engineering Sentinel
Ages 10–18
|
Social Engineering Sentinel — safe behaviors when facing pretext calls and impersonation attacks (2.2b); protecting personal identity from authority manipulation (2.2c); recognizing social engineering as a cyber threat vector including vishing, tailgating, and multi-vector con artists (2.2d) |
| Mission | CSTA Codes | What's Covered |
|---|---|---|
|
Password Fortress
Ages 8–12
|
Password Fortress — encryption concepts (NI-2-6); safe credential practices (NI-2-7); cybersecurity ethics (IC-2-4) | |
|
Phishing Pond
Ages 8–12
|
Phishing Pond — social engineering defense (NI-2-7); phishing as computing impact (IC-2-4); advanced threat analysis (IC-3B-4) | |
|
Privacy Shield
Ages 8–12
|
Privacy Shield — privacy and personal data (IC-2-4, IC-2-5); digital data protection (NI-2-6) | |
|
Social Savvy
Ages 8–14
|
Social Savvy — digital citizenship and online identity (IC-2-4); societal impacts of computing (IC-2-5) | |
|
Malware Maze
Ages 10–14
|
Malware Maze — malware and network threats (NI-2-7); advanced network security (NI-3A-7); computing risks (IC-2-4) | |
|
Phishing Inbox Detective
Ages 10–14
|
Phishing Inbox Detective — advanced phishing simulation (NI-3A-7); threat analysis (IC-3B-4); safe behaviors (NI-2-7) | |
|
Password Fortress Interactive
Ages 10–14
|
Password Fortress Interactive — encryption and entropy (NI-2-6, NI-3A-6); authentication practice (NI-2-7) | |
|
Two-Factor Fortress
Ages 10–14
|
Two-Factor Fortress — MFA implementation (NI-3A-6); authentication threats (NI-3A-7); safe access (NI-2-7) | |
|
Scam Spotter
Ages 10–14
|
Scam Spotter — social engineering and phone-based threats (NI-2-7); computing impacts (IC-2-4); advanced analysis (IC-3B-4) | |
|
Privacy Guardian
Ages 10–14
|
Privacy Guardian — privacy protection (IC-2-4, IC-2-5); advanced digital citizenship (IC-3B-4) | |
|
Cyberbullying Defender
Ages 10–14
|
Cyberbullying Defender — computing impacts on individuals (IC-2-4); community impacts (IC-2-5); inclusive communities (IC-3A-5) | |
|
AI & Deepfake Detective
Ages 12–18
|
AI & Deepfake Detective — advanced threats from computing (IC-3B-4); AI network threats (NI-3A-7); computing risks (IC-2-4) | |
|
Smart Device & Public Wi-Fi Defender
Ages 10–16
|
Smart Device & Wi-Fi Defender — IoT and network security (NI-2-7, NI-3A-7); cryptography in practice (NI-3A-6) | |
|
Identity Theft & Digital Footprint Defender
Ages 12–18
|
Identity Theft Defender — identity privacy (IC-2-4); advanced identity threats (IC-3B-4); network-based attacks (NI-3A-7) | |
|
Gaming Safety Defender
Ages 8–16
|
Gaming Safety Defender — online safety in games (IC-2-4, IC-2-5); gaming network threats (NI-2-7) | |
|
Deepfake & AI Scam Defender
Ages 10–18
|
Deepfake & AI Scam Defender — AI-generated threats (IC-3B-4); network-based AI scams (NI-3A-7); defense behaviors (IC-2-4) | |
|
Smart Device & IoT Defender
Ages 10–18
|
Smart Device & IoT Defender — IoT encryption (NI-3A-6); IoT threat vectors (NI-3A-7); emerging tech risks (IC-3B-4) | |
|
Synthetic Media Detective
Ages 12–18
|
Synthetic Media Detective — synthetic media as computing threat (IC-3B-4); AI network risks (NI-3A-7); societal impacts (IC-2-5) | |
|
Mind Games: Outsmarting AI Tricksters
Ages 12–18
|
Mind Games — responsible use of AI tools (IC-3A-5); evaluating AI-generated data authenticity (DA-3A-4); understanding automated system vulnerabilities like prompt injection (CS-3A-4) | |
|
Bully Block: Stopping Cyberbullying
Ages 8–18
|
Bully Block — impacts of computing on individuals and communities (IC-2-4, IC-2-5); fostering inclusive and safe computing communities (IC-3A-5); upstander identity and harassment documentation protocol | |
|
Two-Factor Titan
Ages 10–18
|
Two-Factor Titan — multi-factor authentication implementation (NI-3A-6); authentication threat modeling including SIM-swap and credential stuffing (NI-3A-7); safe access control behaviors (NI-2-7) | |
|
Social Engineering Sentinel
Ages 10–18
|
Social Engineering Sentinel — social engineering as a network and human-layer threat (NI-2-7); computing impacts from manipulation attacks on individuals (IC-2-4); advanced threat analysis of multi-vector social engineering combining pretext, authority, and isolation (IC-3B-4) |
Cover page, full ISTE crosswalk, your state's alignment table, and a pilot CTA — ready for curriculum committee review and school board presentations.
Each state page shows the full per-mission table with that state's framework codes, grade bands, and the specific scenes that hit each objective.
Florida NGSSS Computer Science & Digital Citizenship Standards
NY K-12 Computer Science & Digital Fluency Standards (2020)
Illinois Learning Standards for Computer Science (2022)
Texas Essential Knowledge and Skills — Technology Applications (TEKS)
California Computer Science Standards (2018) + Digital Citizenship Framework
Pennsylvania Academic Standards for Computer Science and Information Technology (2022)
Ohio Computer Science Standards (2022) + Digital Wellness and Safety
Georgia K-12 Computer Science Standards (2021)
NC K-12 Computer Science and Digital Learning Plan (2022)
Virginia Computer Science Standards of Learning (2017, revised 2022)
Arizona K-12 Computer Science Standards (2018) + ADE Educational Technology Standards (2022 / ISTE)
We're adding new state alignments every quarter. Start a free pilot and we'll send the alignment document for your state within 5 business days.
ISTE + your state alignment table, formatted for curriculum committee review. Sent immediately — no waiting.