Awareness Rankings
See the strongest awareness scores, then open a user profile to explore their progress.
Once training attempts are saved, the top awareness scores will appear here.
Your Training History
Attempt Archive
Browse your saved training attempts and keep track of your awareness progress over time.
History Locked
Sign in to review past attempts
Your saved training history, detailed answer review, and long-term progress will appear here once you sign in.
Once you finish signed-in training sets, your attempt history will show here for review.
Awareness Milestones
Unlock easier starter badges first, then work toward the harder recognition goals as your training progress grows.
Badges Locked
Sign in to unlock awareness badges
Save training progress, collect milestone badges, and build a stronger awareness record over time.
Finish a few signed-in training sets and your first awareness badges will show here.
Your Training Profile
A personal view of your account, awareness progress, and earned training milestones.
Profile Locked
Sign in to build your training profile
Track your saved attempts, growth by topic, badges, and personal awareness progress after you create an account.
Account
Student
Training account
Complete a few signed-in training attempts to begin your awareness rank progress.
Add a short note to your profile.
Unlocked Badges
Milestones Earned
Finish signed-in training sets and your earned awareness milestones will appear here.
Login Page Check
Inspect a realistic login page and decide whether it looks legitimate or suspicious before signing in.
Email Header Clues
Inspect a suspicious account notice and click the strongest clues before trusting the sender.
QR Poster Check
More hands-on lab scenarios will appear here as the practical training path expands.
File Share Trap
More hands-on lab scenarios will appear here as the practical training path expands.
Password Reset SMS
More hands-on lab scenarios will appear here as the practical training path expands.
Delivery Scam Chat
More hands-on lab scenarios will appear here as the practical training path expands.
Hands-On Lab
Login Page Check
Inspect the fake login page and click the strongest red flags.
You receive a message that says your school account will be disabled in the next hour unless you log in through https://lcc-student-verify.helpdesk-login.net.
Hello student,
Your enrollment details need same-day correction before records close. Review the account notice and confirm your information at once.
Use the button below to continue.
Scan the code below to avoid interruption to your campus internet access.
Open the access page and sign in immediately.
Find The Red Flags
Click the 3 strongest warning signs
You only get 3 picks, so choose carefully.
Available Training
Choose a quiz set and strengthen your phishing awareness one topic at a time.
URL Basics
Practice checking links and recognizing URL patterns that are often used in phishing attempts.
Login Page Clues
Practice checking login pages for warning signs before entering your school or personal account details.
Message Red Flags
Learn how to notice warning signs in emails, texts, and chat messages before they put your account or information at risk.
After Clicking: What to Do?
Review the right steps to take after clicking a suspicious link or sharing personal details on an unsafe page.
QR & Link Safety
Learn how hidden destinations in QR codes and links can lead to risky pages even when they look harmless at first.
Social Media Scams
Practice spotting phishing and impersonation tactics that often appear in social media posts, chats, and direct messages.
Sender & Source Checks
Build stronger habits for checking who sent a message and whether the source really matches the organization it claims to be.
Attachment & Download Safety
Practice safer decisions when messages include unexpected files, downloads, or documents that ask you to open them quickly.
Account Recovery Traps
Learn how phishing messages abuse resets, verification steps, and recovery claims to steal account access.
Form & Data Requests
Practice noticing when a page or message asks for more information than a legitimate process usually needs.
Payment & Delivery Scams
Strengthen your judgment around phishing attempts involving fees, deliveries, billing problems, and fake payment requests.
Support Impersonation
Spot the tricks used by fake support staff, helpdesk pages, and urgent notices that try to steal trust and access.
Scholarship Bait
Work through higher-pressure scholarship and grant scams that mix urgency, prestige, and fake verification steps.
Document Sharing Traps
Spot the riskier sharing tricks that use shared files, comments, and access requests to lure users into fake sign-ins.
Mobile Alert Deception
Handle mobile-style phishing cases that use push alerts, SMS warnings, and account notices designed for fast phone reactions.
Event Registration Risks
Practice spotting riskier event and registration scams that use limited slots, fake organizers, and payment pressure.
Marketplace & Meetup Scams
Handle phishing-style scam cases that mix payment pressure, fake buyer support, and identity checks in peer-to-peer deals.
Multi-Step Phish Cases
Work through chained phishing cases where several believable steps appear before the real credential theft attempt happens.
Campus Portal Spoofs
Analyze more deceptive portal copies that mix familiar campus details with cloned login and update prompts.
Urgent Admin Fraud
Handle deceptive admin-style messages that imitate registrar, finance, or IT notices with stronger authority pressure.
Cloud Drive Compromise
Work through advanced file-sharing cases where fake storage notices, access errors, and permission prompts hide credential theft.
Internship Hiring Scams
Practice tougher hiring-related phishing cases involving fake recruiters, application portals, and job verification traps.
Verification Chain Attacks
Work through the hardest verification flows where attackers chain links, forms, and codes together to reach full account takeover.
Phishing Scenarios
Go through realistic situations that test how well you can identify and respond to possible phishing attempts.
Executive Impersonation
Handle high-pressure messages that pretend to come from school leaders, administrators, or decision-makers.
Breach Follow-Up Scams
Practice spotting fake breach warnings that try to exploit fear after a supposed security incident.
Recovery Flow Attacks
Learn to recognize suspicious account recovery steps, one-time-code traps, and takeover attempts.
Financial Approval Fraud
Spot convincing approval requests involving reimbursements, invoices, budgets, and last-minute payments.
Cross-Channel Takeovers
Work through attacks that jump across email, text, chat, and calls to feel more believable.
Best Practices
Strengthen your everyday safety habits with practical best practices for accounts, messages, and suspicious websites.
Vendor Portal Breaches
Assess supplier portals, invoice workflows, and login prompts that look legitimate at first glance.
Identity Chain Spoofs
Work through attacks that reuse trusted names, old threads, and familiar roles to build trust.
Cloud Consent Traps
Judge risky app permissions, shared workspace invites, and sign-in flows on real cloud platforms.
Incident Response Bait
Evaluate fake security escalations that sound procedural and push you toward the wrong response.
Multi-Actor Escalations
Analyze attacks where different roles and channels reinforce the same false request.
Trust Layer Collisions
Break down advanced situations where branding, urgency, and technical signals conflict.
Zero-Trust Breakpoints
Judge access requests that exploit trusted workflows, shared tenants, and internal policy gaps.
Live Session Hijacks
Analyze real-time prompts, re-auth flows, and sign-in interruptions that steal active access.
Delegated Access Fraud
Review approval rights, shared accounts, and delegated permissions used to widen compromise.
Forensic Cover Stories
Break down fake investigation trails, evidence requests, and incident narratives meant to disarm checks.
Approval Chain Poisoning
Test requests that abuse escalations, sign-off loops, and layered approvals to seem legitimate.
Adaptive Impersonation Loops
Handle attackers who change tone, role, and pressure as your skepticism starts to rise.
Supply Chain Shadowing
Assess partner-linked requests that piggyback on real vendors, invoices, and workflow timing.
Federated Login Pivots
Judge identity hops that move across SSO, tenants, and app handoffs to hide the real risk.
Trust Graph Manipulation
Read relationship-based attacks that misuse old contacts, overlapping teams, and shared history.
Incident Command Spoofs
Handle crisis-style requests that imitate coordinated response teams, war rooms, and live escalation.
Recovery Delegation Loops
Analyze chained recovery requests that mix approval handoffs, resets, and identity verification.
Environment Poisoning Cases
Break down scenarios where settings, tools, and context are subtly altered before the phish lands.
Cross-Tenant Bleedthrough
Judge ultra-subtle tenant confusion cases where trust leaks between real shared environments.
Response Playbook Subversion
Break down attacks that twist familiar containment and recovery playbooks against the defender.
Consent Laundering Rings
Analyze app approval flows that stay technically valid while hiding layered abuse paths.
Governance Theater Attacks
Spot requests that weaponize audits, committees, and policy optics to force unsafe action.
Identity Weathering Loops
Handle long-form attacks that slowly erode caution through repeated low-suspicion contact.
Signal Fog Exploitation
Untangle cases where many weak signals combine until the wrong action feels justifiable.
Trust Collapse Scenarios
Judge near-perfect cases where every familiar signal holds until one final trust boundary fails.
Operator Blend Intrusions
Handle attacks where human behavior, platform logic, and context cues align too well to doubt.
Decision Fatigue Breaches
Break down elite pressure stacks that rely on ambiguity, speed, and mental exhaustion.
Control Plane Misdirection
Read cases where admin logic, recovery paths, and security controls are twisted into bait.
Cognitive Overlap Attacks
Untangle scenarios where several believable explanations overlap until the wrong choice feels rational.
Irrecoverable Trust Failures
Evaluate final-form cases where one bad action could permanently widen access or exposure.
Training in Progress
Training Title
Training description
Awareness Check