Next
Next
You and your friends find yourselves trapped in a mysterious digital world. To escape, you must solve a series of challenges scattered throughout the virtual environment. Time to put your Cybersecurity skills to the test.
Next
Learning Objectives
Instructions
Hints & Tips
Teacher Instructions
Start
This page is password protected
Enter the password
This page is password protected
Enter the password
This page is password protected
Enter the password
This page is password protected
Enter the password
This page is password protected
Enter the password
Pay special attention to the placement of the correct answers.
Introduction
change your password regularly
don't share Your pAssword
use a mnemonic device
Introduction
Verify Identies
Think before you click
This page is password protected
Enter the password
Introduction
Password-Protected. Use a Caesar cipher with a forward shift of 7.
Enter the password
Introduction
Think before you share
This page is password protected
Enter the password
Are you ready to escape?
Previous Passwords matter (4 letters)
You come face-to-face with a digital marketplace where personal information is bought and sold. Learn about the importance of protecting your privacy and keeping your Personally Identifiable Information (PII) safe from prying eyes. Navigate through various scenarios and make choices that will safeguard your identity.
Instructions
Welcome to the Cybersecurity Escape Room!
- Choose a room to get started.
- Start by reading the introduction. Hints are also available.
- Each room has clues, activities, and advice based on its theme. Not all activities will give you a clue but are important to the learning.
- Once you think you have collected all of the clues, click on the lock to try and escape.
- The only way to move on is by escaping the room that you are in.
Good luck!
Teacher Instructions
Privacy Patrol
Password Protection
Let's Go Phishing
It's a Cipher
Click on a room to learn everything you need to help your students. Get answers to puzzles and learn more about specific activites. The teacher instructions are password protected. You should have received this information in your email. If you didn't and would like to request a password, click HERE. All rooms can be completed without this information but it may be more difficult.
Hints & Tips
- You are looking for green letters and symbols
- Have a piece of paper and a pencil nearby to keep track of clues. Once you solve a puzzle, make sure you keep track of the password, you'll need it for the final lock
- Not all activities will provide clues but they are necessary for learning
- You may have to come back to an activity as it may not make sense. Gaining knowledge from another activity can help you
- Not all clues are visible right away. Make sure you check the learning environment
- Read ALL Introductions before starting
- There is a hint available in each room that will provide more information about the password
- All passwords are case-sensitive, have no spaces, and have to do with the theme of the room
You stumble upon a simulated email inbox filled with messages. Some are legitimate, but others are suspicious and could be phishing attempts. Your task is to identify the phishing attempts and avoid falling into the traps set by cybercriminals.
Learning Objectives
Password Protected:
- Identify the characteristics of a strong password
- Demonstrate the ability to create and remember secure passwords
- Explain the importance of keeping passwords confidential and not sharing them with others
Let's Go Phishing:
- Define phishing and recognize common phishing tactics.
- Identify suspicious emails or messages
- Demonstrate the ability to verify the authenticity of emails and websites
It's A Cipher:
- Describe the purpose of encryption and decryption in cybersecurity.
- Explore the Caesar cipher technique
- Apply encryption and decryption techniques to encode and decode messages.
Privacy Patrol:
- Define Personally Identifiable Information (PII) and examples of PII.
- Identify potential risks associated with sharing PII online.
- Demonstrate strategies for protecting privacy and minimizing the exposure of PII on the internet.
NYS CS/DF Learning Standards
- You Find yourselves trapped in a virtual vault filled with treasure, but the only way to escape is by cracking the password. In thIs room, you'll learn about the importance of strong passwords and how to create them. Solve puzzles and answer questIons to uncover clues that will help you unlock the vault and escape safely. When you think you have all of your clues try cracking the code by clicking on the lock icon.
You encounter a mysterious message written in code. To decipher it and proceed further, you must learn the art of encryption and decryption. Explore the Ceasar cipher technique and use your problem-solving skills to unlock the secrets hidden within.
American Revolution Escape Room
Darren Bonafede
Created on November 25, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Fill in Blanks
View
Countdown
View
Stopwatch
View
Unpixelator
View
Break the Piñata
View
Bingo
View
Create a Secret Code
Explore all templates
Transcript
Next
Next
You and your friends find yourselves trapped in a mysterious digital world. To escape, you must solve a series of challenges scattered throughout the virtual environment. Time to put your Cybersecurity skills to the test.
Next
Learning Objectives
Instructions
Hints & Tips
Teacher Instructions
Start
This page is password protected
Enter the password
This page is password protected
Enter the password
This page is password protected
Enter the password
This page is password protected
Enter the password
This page is password protected
Enter the password
Pay special attention to the placement of the correct answers.
Introduction
change your password regularly
don't share Your pAssword
use a mnemonic device
Introduction
Verify Identies
Think before you click
This page is password protected
Enter the password
Introduction
Password-Protected. Use a Caesar cipher with a forward shift of 7.
Enter the password
Introduction
Think before you share
This page is password protected
Enter the password
Are you ready to escape?
Previous Passwords matter (4 letters)
You come face-to-face with a digital marketplace where personal information is bought and sold. Learn about the importance of protecting your privacy and keeping your Personally Identifiable Information (PII) safe from prying eyes. Navigate through various scenarios and make choices that will safeguard your identity.
Instructions
Welcome to the Cybersecurity Escape Room!
- Once you think you have collected all of the clues, click on the lock to try and escape.
- The only way to move on is by escaping the room that you are in.
Good luck!Teacher Instructions
Privacy Patrol
Password Protection
Let's Go Phishing
It's a Cipher
Click on a room to learn everything you need to help your students. Get answers to puzzles and learn more about specific activites. The teacher instructions are password protected. You should have received this information in your email. If you didn't and would like to request a password, click HERE. All rooms can be completed without this information but it may be more difficult.
Hints & Tips
You stumble upon a simulated email inbox filled with messages. Some are legitimate, but others are suspicious and could be phishing attempts. Your task is to identify the phishing attempts and avoid falling into the traps set by cybercriminals.
Learning Objectives
Password Protected:
Let's Go Phishing:
It's A Cipher:
Privacy Patrol:
NYS CS/DF Learning Standards
- You Find yourselves trapped in a virtual vault filled with treasure, but the only way to escape is by cracking the password. In thIs room, you'll learn about the importance of strong passwords and how to create them. Solve puzzles and answer questIons to uncover clues that will help you unlock the vault and escape safely. When you think you have all of your clues try cracking the code by clicking on the lock icon.
You encounter a mysterious message written in code. To decipher it and proceed further, you must learn the art of encryption and decryption. Explore the Ceasar cipher technique and use your problem-solving skills to unlock the secrets hidden within.