Navigate real-world cybersecurity challenges. Your decisions determine how safe your data stays.
Choose a scenario to begin
Build strong passwords and learn why "password123" is basically an open door for hackers.
Choose the strongest authentication method and understand why layers of security matter.
Spot the red flags in a suspicious email before clicking anything that could compromise you.
Decide which app permissions are necessary โ and which ones are data grabs in disguise.
A breach just happened. Identify which data is most sensitive and needs immediate action.
Last updated: 04/13/2026
Here's how you performed