Available Training

Choose a quiz set and strengthen your phishing awareness one topic at a time.

Core Series

URL Basics

Practice checking links and recognizing URL patterns that are often used in phishing attempts.

5 Questions 80 pts Beginner
Core Series

Login Page Clues

Practice checking login pages for warning signs before entering your school or personal account details.

5 Questions 100 pts Beginner
Core Series

Message Red Flags

Learn how to notice warning signs in emails, texts, and chat messages before they put your account or information at risk.

5 Questions 110 pts Intermediate
Core Series

After Clicking: What to Do?

Review the right steps to take after clicking a suspicious link or sharing personal details on an unsafe page.

5 Questions 90 pts Beginner
Core Series

QR & Link Safety

Learn how hidden destinations in QR codes and links can lead to risky pages even when they look harmless at first.

5 Questions 110 pts Intermediate
Core Series

Social Media Scams

Practice spotting phishing and impersonation tactics that often appear in social media posts, chats, and direct messages.

5 Questions 120 pts Intermediate
Skill Builder Series

Sender & Source Checks

Build stronger habits for checking who sent a message and whether the source really matches the organization it claims to be.

5 Questions 130 pts Intermediate
Skill Builder Series

Attachment & Download Safety

Practice safer decisions when messages include unexpected files, downloads, or documents that ask you to open them quickly.

5 Questions 130 pts Intermediate
Skill Builder Series

Account Recovery Traps

Learn how phishing messages abuse resets, verification steps, and recovery claims to steal account access.

5 Questions 140 pts Hard
Skill Builder Series

Form & Data Requests

Practice noticing when a page or message asks for more information than a legitimate process usually needs.

5 Questions 140 pts Hard
Skill Builder Series

Payment & Delivery Scams

Strengthen your judgment around phishing attempts involving fees, deliveries, billing problems, and fake payment requests.

5 Questions 150 pts Hard
Skill Builder Series

Support Impersonation

Spot the tricks used by fake support staff, helpdesk pages, and urgent notices that try to steal trust and access.

5 Questions 150 pts Hard
Challenger Series

Scholarship Bait

Work through higher-pressure scholarship and grant scams that mix urgency, prestige, and fake verification steps.

5 Questions 160 pts Hard
Challenger Series

Document Sharing Traps

Spot the riskier sharing tricks that use shared files, comments, and access requests to lure users into fake sign-ins.

5 Questions 160 pts Hard
Challenger Series

Mobile Alert Deception

Handle mobile-style phishing cases that use push alerts, SMS warnings, and account notices designed for fast phone reactions.

5 Questions 170 pts Hard
Challenger Series

Event Registration Risks

Practice spotting riskier event and registration scams that use limited slots, fake organizers, and payment pressure.

5 Questions 170 pts Hard
Challenger Series

Marketplace & Meetup Scams

Handle phishing-style scam cases that mix payment pressure, fake buyer support, and identity checks in peer-to-peer deals.

5 Questions 180 pts Hard
Challenger Series

Multi-Step Phish Cases

Work through chained phishing cases where several believable steps appear before the real credential theft attempt happens.

5 Questions 190 pts Hard
Advanced Series

Campus Portal Spoofs

Analyze more deceptive portal copies that mix familiar campus details with cloned login and update prompts.

5 Questions 200 pts Advanced
Advanced Series

Urgent Admin Fraud

Handle deceptive admin-style messages that imitate registrar, finance, or IT notices with stronger authority pressure.

5 Questions 210 pts Advanced
Advanced Series

Cloud Drive Compromise

Work through advanced file-sharing cases where fake storage notices, access errors, and permission prompts hide credential theft.

5 Questions 220 pts Advanced
Advanced Series

Internship Hiring Scams

Practice tougher hiring-related phishing cases involving fake recruiters, application portals, and job verification traps.

5 Questions 220 pts Advanced
Advanced Series

Verification Chain Attacks

Work through the hardest verification flows where attackers chain links, forms, and codes together to reach full account takeover.

5 Questions 230 pts Advanced
Advanced Series

Phishing Scenarios

Go through realistic situations that test how well you can identify and respond to possible phishing attempts.

5 Questions 240 pts Advanced
Mastery Series

Executive Impersonation

Handle high-pressure messages that pretend to come from school leaders, administrators, or decision-makers.

5 Questions 250 pts Mastery
Mastery Series

Breach Follow-Up Scams

Practice spotting fake breach warnings that try to exploit fear after a supposed security incident.

5 Questions 260 pts Mastery
Mastery Series

Recovery Flow Attacks

Learn to recognize suspicious account recovery steps, one-time-code traps, and takeover attempts.

5 Questions 270 pts Mastery
Mastery Series

Financial Approval Fraud

Spot convincing approval requests involving reimbursements, invoices, budgets, and last-minute payments.

5 Questions 280 pts Mastery
Mastery Series

Cross-Channel Takeovers

Work through attacks that jump across email, text, chat, and calls to feel more believable.

5 Questions 290 pts Mastery
Mastery Series

Best Practices

Strengthen your everyday safety habits with practical best practices for accounts, messages, and suspicious websites.

5 Questions 320 pts Mastery
Elite Series

Vendor Portal Breaches

Assess supplier portals, invoice workflows, and login prompts that look legitimate at first glance.

5 Questions 340 pts Elite
Elite Series

Identity Chain Spoofs

Work through attacks that reuse trusted names, old threads, and familiar roles to build trust.

5 Questions 350 pts Elite
Elite Series

Cloud Consent Traps

Judge risky app permissions, shared workspace invites, and sign-in flows on real cloud platforms.

5 Questions 360 pts Elite
Elite Series

Incident Response Bait

Evaluate fake security escalations that sound procedural and push you toward the wrong response.

5 Questions 370 pts Elite
Elite Series

Multi-Actor Escalations

Analyze attacks where different roles and channels reinforce the same false request.

5 Questions 380 pts Elite
Elite Series

Trust Layer Collisions

Break down advanced situations where branding, urgency, and technical signals conflict.

5 Questions 390 pts Elite
Expert Series

Zero-Trust Breakpoints

Judge access requests that exploit trusted workflows, shared tenants, and internal policy gaps.

5 Questions 410 pts Expert
Expert Series

Live Session Hijacks

Analyze real-time prompts, re-auth flows, and sign-in interruptions that steal active access.

5 Questions 420 pts Expert
Expert Series

Delegated Access Fraud

Review approval rights, shared accounts, and delegated permissions used to widen compromise.

5 Questions 430 pts Expert
Expert Series

Forensic Cover Stories

Break down fake investigation trails, evidence requests, and incident narratives meant to disarm checks.

5 Questions 440 pts Expert
Expert Series

Approval Chain Poisoning

Test requests that abuse escalations, sign-off loops, and layered approvals to seem legitimate.

5 Questions 450 pts Expert
Expert Series

Adaptive Impersonation Loops

Handle attackers who change tone, role, and pressure as your skepticism starts to rise.

5 Questions 460 pts Expert
Pro Series

Supply Chain Shadowing

Assess partner-linked requests that piggyback on real vendors, invoices, and workflow timing.

5 Questions 480 pts Pro
Pro Series

Federated Login Pivots

Judge identity hops that move across SSO, tenants, and app handoffs to hide the real risk.

5 Questions 490 pts Pro
Pro Series

Trust Graph Manipulation

Read relationship-based attacks that misuse old contacts, overlapping teams, and shared history.

5 Questions 500 pts Pro
Pro Series

Incident Command Spoofs

Handle crisis-style requests that imitate coordinated response teams, war rooms, and live escalation.

5 Questions 510 pts Pro
Pro Series

Recovery Delegation Loops

Analyze chained recovery requests that mix approval handoffs, resets, and identity verification.

5 Questions 520 pts Pro
Pro Series

Environment Poisoning Cases

Break down scenarios where settings, tools, and context are subtly altered before the phish lands.

5 Questions 530 pts Pro
Legend Series

Cross-Tenant Bleedthrough

Judge ultra-subtle tenant confusion cases where trust leaks between real shared environments.

5 Questions 550 pts Legend
Legend Series

Response Playbook Subversion

Break down attacks that twist familiar containment and recovery playbooks against the defender.

5 Questions 560 pts Legend
Legend Series

Consent Laundering Rings

Analyze app approval flows that stay technically valid while hiding layered abuse paths.

5 Questions 570 pts Legend
Legend Series

Governance Theater Attacks

Spot requests that weaponize audits, committees, and policy optics to force unsafe action.

5 Questions 580 pts Legend
Legend Series

Identity Weathering Loops

Handle long-form attacks that slowly erode caution through repeated low-suspicion contact.

5 Questions 590 pts Legend
Legend Series

Signal Fog Exploitation

Untangle cases where many weak signals combine until the wrong action feels justifiable.

5 Questions 600 pts Legend
Apex Series

Trust Collapse Scenarios

Judge near-perfect cases where every familiar signal holds until one final trust boundary fails.

5 Questions 620 pts Apex
Apex Series

Operator Blend Intrusions

Handle attacks where human behavior, platform logic, and context cues align too well to doubt.

5 Questions 630 pts Apex
Apex Series

Decision Fatigue Breaches

Break down elite pressure stacks that rely on ambiguity, speed, and mental exhaustion.

5 Questions 640 pts Apex
Apex Series

Control Plane Misdirection

Read cases where admin logic, recovery paths, and security controls are twisted into bait.

5 Questions 650 pts Apex
Apex Series

Cognitive Overlap Attacks

Untangle scenarios where several believable explanations overlap until the wrong choice feels rational.

5 Questions 660 pts Apex
Apex Series

Irrecoverable Trust Failures

Evaluate final-form cases where one bad action could permanently widen access or exposure.

5 Questions 670 pts Apex