Want to create interactive content? It’s easy in Genially!

Get started free

American Revolution Escape Room

Darren Bonafede

Created on November 25, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Fill in Blanks

Countdown

Stopwatch

Unpixelator

Break the Piñata

Bingo

Create a Secret Code

Transcript

Next

Next

You and your friends find yourselves trapped in a mysterious digital world. To escape, you must solve a series of challenges scattered throughout the virtual environment. Time to put your Cybersecurity skills to the test.

Next

Learning Objectives

Instructions

Hints & Tips

Teacher Instructions

Start

This page is password protected

Enter the password

This page is password protected

Enter the password

This page is password protected

Enter the password

This page is password protected

Enter the password

This page is password protected

Enter the password

Pay special attention to the placement of the correct answers.

Introduction

change your password regularly
don't share Your pAssword
use a mnemonic device

Introduction

Verify Identies

Think before you click

This page is password protected

Enter the password

Introduction

Password-Protected. Use a Caesar cipher with a forward shift of 7.

Enter the password

Introduction

Think before you share

This page is password protected

Enter the password

Are you ready to escape?

Previous Passwords matter (4 letters)

You come face-to-face with a digital marketplace where personal information is bought and sold. Learn about the importance of protecting your privacy and keeping your Personally Identifiable Information (PII) safe from prying eyes. Navigate through various scenarios and make choices that will safeguard your identity.

Instructions

Welcome to the Cybersecurity Escape Room!

  • Choose a room to get started.
  • Start by reading the introduction. Hints are also available.
  • Each room has clues, activities, and advice based on its theme. Not all activities will give you a clue but are important to the learning.
  • Once you think you have collected all of the clues, click on the lock to try and escape.
  • The only way to move on is by escaping the room that you are in.
Good luck!

Teacher Instructions

Privacy Patrol

Password Protection

Let's Go Phishing

It's a Cipher

Click on a room to learn everything you need to help your students. Get answers to puzzles and learn more about specific activites. The teacher instructions are password protected. You should have received this information in your email. If you didn't and would like to request a password, click HERE. All rooms can be completed without this information but it may be more difficult.

Hints & Tips

  • You are looking for green letters and symbols
  • Have a piece of paper and a pencil nearby to keep track of clues. Once you solve a puzzle, make sure you keep track of the password, you'll need it for the final lock
  • Not all activities will provide clues but they are necessary for learning
  • You may have to come back to an activity as it may not make sense. Gaining knowledge from another activity can help you
  • Not all clues are visible right away. Make sure you check the learning environment
  • Read ALL Introductions before starting
  • There is a hint available in each room that will provide more information about the password
  • All passwords are case-sensitive, have no spaces, and have to do with the theme of the room

You stumble upon a simulated email inbox filled with messages. Some are legitimate, but others are suspicious and could be phishing attempts. Your task is to identify the phishing attempts and avoid falling into the traps set by cybercriminals.

Learning Objectives

Password Protected:

  • Identify the characteristics of a strong password
  • Demonstrate the ability to create and remember secure passwords
  • Explain the importance of keeping passwords confidential and not sharing them with others

Let's Go Phishing:

  • Define phishing and recognize common phishing tactics.
  • Identify suspicious emails or messages
  • Demonstrate the ability to verify the authenticity of emails and websites

It's A Cipher:

  • Describe the purpose of encryption and decryption in cybersecurity.
  • Explore the Caesar cipher technique
  • Apply encryption and decryption techniques to encode and decode messages.

Privacy Patrol:

  • Define Personally Identifiable Information (PII) and examples of PII.
  • Identify potential risks associated with sharing PII online.
  • Demonstrate strategies for protecting privacy and minimizing the exposure of PII on the internet.

NYS CS/DF Learning Standards

- You Find yourselves trapped in a virtual vault filled with treasure, but the only way to escape is by cracking the password. In thIs room, you'll learn about the importance of strong passwords and how to create them. Solve puzzles and answer questIons to uncover clues that will help you unlock the vault and escape safely. When you think you have all of your clues try cracking the code by clicking on the lock icon.

You encounter a mysterious message written in code. To decipher it and proceed further, you must learn the art of encryption and decryption. Explore the Ceasar cipher technique and use your problem-solving skills to unlock the secrets hidden within.