Career Exploration
Description: Visit a security operations center with seven departments (investigate, securely provision, collect and operate, operate and maintain, protect and defend, analyze, oversee and governance) to discover the types of careers, credentials, and education and training required. The game creates a report card to track of all the flags you need to discover.
 
Key Words: cyber, cybersecurity, career, protect, defend, analyze, education, credential, operate, investigate, collect
 
Level:   Middle School      High School     Community College     
Cyber Hat Match
Description: Unscramble cybersecurity terms. Finish all eight (8) levels and you win. The game begins with 3-letter words. You get three attempts per term. Unscramble five terms at a level to move to the next level. Each subsequent level uses longer terms.
 
Key Words: game, cybersecurity, cyber, terms
 
Level:   High School     Community College     
Cyber Scramble
Description: Unscramble cybersecurity terms. Finish all eight (8) levels and you win. The game begins with 3-letter words. You get three attempts per term. Unscramble five terms at a level to move to the next level. Each subsequent level uses longer terms.
 
Key Words: game, cybersecurity, cyber, terms
 
Level:   Middle School      High School     Community College     
Cybersecurity Scenario
Description: Discover the evidence before a hacker exploits the company's system.
 
Key Words: hack, easter, eggs, challenge, ctf, cyber
 
Level:   Middle School      High School     
Cookie Caper
Description: An interactive game to learn how cookies track information on a website.
 
Key Words: website, session, persistent, track, advertise, browsing, personal, information, attack, cookie, zombie, privacy, hijack
 
Level:   Middle School      High School     Community College     University
Ethical Hacking Case
Description: Investigate a scene to find pieces of evidence and clues to a hacker's identity and solve the crime.
 
Key Words: reconnaissance footprint, investigate
 
Level:   igh School     Community College     
Ethics Challenge
Description: Investigate a scene to find pieces of evidence and clues to a hacker's identity and solve the crime.
 
Key Words: reconnaissance footprint, investigate
 
Level:   High School     Community College     
Hacker Hangman
Description: This game uses words (or clues) in two categories (cybersecurity principles and social engineering) from four Emates (Five Pillars of Information Security, The Cube, Social Engineering, and Social Engineering Tactics). Guess the word before the hacker hangs.
 
Key Words: game, cyber, principles, security
 
Level:   Middle School      High School     Community College     
OSINT Personal Data Challenge
Description: Learn how to use open-source intelligence to provide a wealth of information.
 
Key Words: osint, public, intelligence, law, information, target, victim, metadata, location, dumpster, social, attack, tool
 
Level:   Middle School      High School     Community College     
Phishing Mystery
Description: Play along to see how phishing can capture useful information.
 
Key Words: attack, malicious, smish, vish, social, scam
 
Level:   Middle School      High School     Community College     
The Cube Challenge
Description: Assess the student’s understanding of the McCumber cube by classifying each challenge correctly by dimension--security principles, data states and countermeasures.
 
Key Words: mccumber, state, measure, property, confidentiality, integrity, availability, processing, storage, transmission, policy, technology, awareness, training, data, countermeasures, cybersecurity, principles, cube
 
Level:   Community College     University
What’s My Crime?
Description: Match the social engineering technique with its description.
 
Key Words: phishing, baiting, whaling, dumpster diving, ransomware, pretexting, tailgating, shoulder surfing
 
Level:   Middle School      High School     Community College     
Various Types of Attacks Evaluation: Code Injection
Description: Assesses knowledge of the various code injection attacks.
 
Key Words: input, query, data, loss, sql, cross, code, command, injection, attack, secure, coding
 
Level:   Middle School      High School     
Access Control
Description: Explains the process, procedures, systems, and technologies used to ensure that only authorized users and systems gain the right to use data, systems, resources, and information.
 
Key Words: subject, object, model, identity, management, authorize, authentication, accountability, authorization, role, rule, dac, mac, access control, physical, logical, administrative
 
Level:   Community College     University
Malware Types, Advanced Persistent Threats, Zero Day Attacks
Description: Malware (malicious code) is software that has been created for malicious or nefarious purposes. Malicious code can be installed in many devious ways that can be easy to miss by authorized users.
 
Key Words: virus, worm, trojan, access, logic bomb, keylogger, spyware, adware, bot, rootkit, threat, attack, zero-day
 
Level:   Middle School      High School     Community College     
Biometrics
Description: Biometrics are body measurements and calculations based on unique physical characteristics and are used for authentication.
 
Key Words: authentication, recognition, retina, fingerprint, voice, hand, keystroke, signature, iris, physiological, behavioral, scan, metric, false error, rate, legal, ethical, biometric
 
Level:   High School     Community College     
Buffer Overflow
Description: Programs allocate finite-sized blocks of memory, called buffers, to store data as they work on it. A buffer overflow happens when the amount of data written to or read from a buffer exceeds the capacity of what it can hold.
 
Key Words: block, memory, ram, code, attack, inject, malicious, overflow, buffer, attack, secure coding
 
Level:   High School     Community College     
Code Injection Attacks
Description: illustrates how an attacker may insert an untrusted input into a program to achieve a malicious outcome
 
Key Words: input, query, data, loss, sql, cross, code, command, injection, attack, secure coding, buffer
 
Level:   Middle School      High School     
Configuration Management
Description: Configuration management identifies, controls, accounts for, and audits any changes made to an established baseline configuration.
 
Key Words: baseline, update, patch, antivirus, service, install, change, white, black, change control, configuration
 
Level:   Community College     University
Cross Site Scripting
Description: Discover how cross-site scripting is used to exploit web site vulnerabilities.
 
Key Words: code, inject, malicious, attack, web, browser, xss, javascript, input, secure coding
 
Level:   High School     Community College     
The Cube
Description: Explores a framework used to establish and evaluate information security.
 
Key Words: mccumber, state, measure, property, confidentiality, integrity, availability, processing, storage, transmission, policy, technology, awareness, training, data, countermeasures, cybersecurity, principles
 
Level:   Middle School      High School     Community College     University
Cybersecurity Controls
Description: Explore the various types of cybersecurity controls that an organization implements to avoid, detect, counteract, or minimize security risks to its assets.
 
Key Words: preventative, detective, corrective, deterrent, recovery, compensating, compliance, administrative, technical, physical, controls
 
Level:   Community College     University
Cybersecurity Design Principles
Description: Explore how security design principles help to achieve the main tenets of information security.
 
Key Words: principle, authorization, minimization, usability, open, least, astonishment, trust, modularity, layering, separation, fail, isolation, design, cybersecurity
 
Level:   Community College     University
Data Roles
Description: Explore several distinct roles in the Information Security Management process to ensure that individuals and management clearly define and understand critical responsibilities in managing the organization’s information assets.
 
Key Words: owner, custodian, processor, steward, controller, subject, governance, threat, policy
 
Level:   Community College     University
Ethics and Professional Conduct
Description: Explore ethics and values as they particularly apply to the code of ethics developed by the Computer Ethics Institute.
 
Key Words: value, rules, beliefs, code, spy, steal, property, pirate, unauthorized, ethics, constraint, motivation, consistency, morals
 
Level:   High School     Community College     
Extensible Authentication Protocol
Description: Extensible Authentication Protocol (EAP) in an authentication framework which provides a secure way to send identifying information for network authentication.
 
Key Words: 802, authentication, framework, leap, peap
 
Level:   Community College     University
Firewalls
Description: Explore the function of a firewall and the various firewall technologies.
 
Key Words: rules, trust, network, host, traffic, stateless, packet, stateful, application, proxy, filter
 
Level:   Community College     University
Five Pillars of Information Security
Description: Explore the examples and security components that support the five pillars of information security...confidentiality, integrity, availability, authenticity, and nonrepudiation.
 
Key Words: confidentiality, integrity, availability, authenticity, nonrepudiation, cia, authentication
 
Level:   Middle School      High School     Community College     
Google Hacking
Description: Learn how easy it is to find valuable data and exploit it using Google.
 
Key Words: footprint, social, media, search, websites, vulnerable, pen, tester, phishing
 
Level:   High School     Community College     
Heartbleed Bug
Description: Learn how the heartbleed bug exploited vulnerabilities.
 
Key Words: vulnerability, ssl, tls, key, attack, eavesdrop, communication, code, attack
 
Level:   High School     Community College     
IDS/IPS
Description: Explore Intrusion detection systems (IDS) and intrusion prevention systems (IPS), tools used to monitor the network.
 
Key Words: intrusion detection system, intrusion prevention system, ids, ips, monitor, alert, packet, rules, unauthorized, signature, anomaly, behavior, sensors
 
Level:   Community College     University
Kerberos
Description: Explore the network authentication protocol that uses encryption, Kerberos.
 
Key Words: authentication, protocol, network, encrypt, key, trust, server, domain, hash, three-headed dog
 
Level:   Community College     University
Meltdown and Spectre
Description: Explore how Meltdown and Spectre affect CPUs released since 1995.
 
Key Words: vulnerability, memory, exploit, attack, code, patch
 
Level:   Middle School      High School     Community College     University
NAT/PAT
Description: The use of NAT and PAT hides the real IP address of internal devices, allows multiple private addresses to access one Internet connection, and helps to conserve IP address space.
 
Key Words: address, port, translation, public, private, IP, class, default, gateway, router, network, multicast
 
Level:   High School     Community College     
Open-Source Intelligence
Description: Explore the different sources available to collect data from public resources.
 
Key Words: osint, public, intelligence, law, information, target, victim, metadata, location, dumpster, social, attack, tool, open-source
 
Level:   Middle School      High School     Community College     
OS Command Injection
Description: Learn how attackers can exploit vulnerable web application by creating scripts that execute commands.
 
Key Words: attack, web, injection, headers, code, vulnerability, operating system, attack
 
Level:   High School     Community College     
Pen Testing
Description: Learn how pen testing seeks to breach systems, people, processes, and code to uncover vulnerabilities.
 
Key Words: network, attack, scan, reconnaissance, access, analysis, exploit, enumeration, packet, policy, train, hacking, pen test, penetration testing
 
Level:   Middle School      High School     Community College     University
Physical and Environmental Protection Controls
Description: Physical and environmental security includes measures that protect systems, buildings and infrastructure against threats associated with the physical environment.
 
Key Words: perimeter, layer, infrastructure, building, access, policy, information, facility, power, location, site
 
Level:   High School     Community College     
Policies, Standards, Procedures, and Guidelines
Description: Describes an organization's governance strategy based on the documents in place.
 
Key Words: governance, guideline, procedure, standard, policy, documentation, best practices, framework, compliance, roles, awareness
 
Level:   High School     Community College     
Privacy Tenets
Description: Understand privacy tenets, which ensure the ethical collection, use, and protection of personal data.
 
Key Words: privacy, law, participation, limitation, scope, accuracy, retention, custody, dissemination, notification, ethical, pii, personal, data
 
Level:   High School     Community College     
The Anatomy of a Ransomware Attack
Description: Proceed step by step through a ransomware attack.
 
Key Words: access, hack, ransom, payment, email, malware, public, key, encrypt, bitcoin, attack
 
Level:   Middle School      High School     Community College     
Risk Analysis
Description: A risk analysis determines possible vulnerabilities and threats, their likelihood and consequences, and the tolerances for such events.
 
Key Words: vulnerability, threat, quantitative, qualitative, asset, tangible, value, exposure, loss, annual rate, analysis, risk
 
Level:   Community College     University
Risk Management
Description: Risk management is a formal process that reduces the impact of threats and vulnerabilities.
 
Key Words: risk, analysis, monitor, respond, assess, due care, due diligence, negligence, asset, threat, agent, vulnerability, countermeasure, control, impact, exposure
 
Level:   Community College     University
Social Engineering
Description: Social engineering is a broad range of malicious activities accomplished through psychological manipulation of people into performing actions or divulging confidential information.
 
Key Words: attack, bait, shoulder surf, pretext, phish, spear, ransomware, tailgating, dumpster, mitigate
 
Level:   Middle School      High School     Community College     
Social Engineering Psychological Tactics
Description: Explore how hackers use various tactics to persuade targets to provide information or take a specific action.
 
Key Words: tactic, target, reciprocity, scarcity, authority, consistency, liking, social proof, persuasion
 
Level:   Middle School      High School     Community College     
Spoofing Attacks
Description: Spoofing attacks occur when an attacker successfully masquerades as another by falsifying data to gain an illegitimate advantage resulting in stolen data, malware, or bypassed access controls.
 
Key Words: arp, dns, ip address, mac, network, dos, hijack, packet, host, tcp, exploit, attack, impersonation, spoofing
 
Level:    High School     Community College     
SQL Injection
Description: Learn how hackers use SQL injection to output data unintentionally.
 
Key Words: attack, database, web, query, exploit, vulnerable, code
 
Level:   High School     Community College     
Stuxnet
Description: Learn how Stuxnet, a sophisticated computer worm, exploited a Windows vulnerability to infect SCADA systems.
 
Key Words: worm, exploit, vulnerability, plc, rootkit
 
Level:   Middle School      High School     Community College     
Threat Actors
Description: Learn the various types of threat agents and what motivates each.
 
Key Words: cyber, agent, hack, hat, state, crime, hacktivist, script kiddie, insider, thrill, terrorist, actor
 
Level:   Middle School      High School     Community College     
Three-way Handshake, Denial of Service, Distributed Denial of Service
Description: Learn how the three-way handshake creates a connection between communicating computers.
 
Key Words: handshake, tcp, transmission, protocol, SYN, ACK, acknowledgement, DOS, denial of service, DDOS, distributed denial of service
 
Level:   Middle School      High School     Community College     University
Wireless Security
Description: Learn how wireless security has evolved over the years.
 
Key Words: ssid, encryption, key management, data integrity, authentication, key, WEP, WPA, TKIP, CCMP, EAP, protocol
 
Level:    Community College     
Virtual Private Networks
Description: Explore how a VPN can safeguard online activities and keep sensitive data secure.
 
Key Words: vpn, encrypt, public, network, tunnel, address, remote access, site-to-site, mobile, personal
 
Level:   Community College     
Protocol Analysis
Description: Monitoring network protocols is crucial for identifying potential threats and ensuring the security of an organization's infrastructure.
 
Key Words: protocol, header, analysis, analyst, cyber, ip, tcp, udp, icmp, ntp, smtp, pop3, imap, email, http, ftp, web, data, packet, arp, threat, attack, malicious
 
Level:   Community College     
Games/Activities

Career Exploration

Stacks Image 306

Cyber Hat Match

Stacks Image 523

Cyber Scramble

Stacks Image 497

Cybersecurity Scenario

Stacks Image 140

Code Injection Attacks Quiz

Stacks Image 90

Cookie Caper

Stacks Image 94

Ethical Hacking Case

Stacks Image 164

Ethics Challenge

Stacks Image 168

Hacker Hangman

Stacks Image 487

OSINT Personal Data Challenge

Stacks Image 224

Phishing Mystery

Stacks Image 246

The Cube Challenge

Stacks Image 118

What's my Crime?

Stacks Image 529

Instructional

Access Control

Stacks Image 70

Attacks: Malware, APT, Zero Day

Stacks Image 68

Biometrics

Stacks Image 33

Buffer Overflow

Stacks Image 72

Code Injection Attacks

Stacks Image 86

Configuration Management

Stacks Image 98

Cross Site Scripting

Stacks Image 102

The Cube

Stacks Image 116

Cybersecurity Controls

Stacks Image 120

Cybersecurity Design Principles

Stacks Image 138

Data Roles

Stacks Image 142

Ethics and Professional Conduct

Stacks Image 166

Extensible Authentication Protocol

Stacks Image 170

Firewalls

Stacks Image 172

Five Pillars of Information Security

Stacks Image 190

Google Hacking

Stacks Image 192

Heart-bleed Bug

Stacks Image 198

IDS/IPS

Stacks Image 548

Kerberos

Stacks Image 216

Meltdown and Spectre

Stacks Image 218

NAT/PAT

Stacks Image 220

Open-source Intelligence

Stacks Image 222

OS Command Injection

Stacks Image 242

Pen Testing

Stacks Image 244

Physical Protection Controls

Stacks Image 248

Policies, Stds, Procedures, Guidelines

Stacks Image 416

Privacy Tenets

Stacks Image 480

Protocol Analysis

Stacks Image 796

Ransomware

Stacks Image 59

Risk Analysis

Stacks Image 262

Risk Management

Stacks Image 264

Social Engineering

Stacks Image 266

Social Engineering Tactics

Stacks Image 268

Spoofing Attacks

Stacks Image 278

SQL Injection

Stacks Image 280

Stuxnet

Stacks Image 282

Threat Actors

Stacks Image 284

Three-way Handshake - DOS - DDOS

Stacks Image 286

Wireless Security

Stacks Image 298

Virtual Private Networks

Stacks Image 517