Home Game-based learning corporate training Crypto: Serious game for cybersecurity
Serious Game for internal communication, training and onboarding

Protect your devices and social networks

Crypto is a dynamic serious game about cybersecurity, set in a biotechnology research company in London. Students become Alex Lee, a security analyst and private detective whose mission is to infiltrate the company and detect its security holes. To achieve this, Alex must interact with the peculiar and diverse staff working in the company. In doing so, she will discover common mistakes often made in relation to IT security, which are then used by cybercriminals to access and steal valuable confidential information.

Crypto is a fun graphic adventure that mixes puzzles, point & click exploratory elements, and an exciting narrative adventure. Students must find, analyze, and exploit corporate cybersecurity holes throughout the five levels of the videogame eventually leading to the most unexpected of endings.

Serious game for cybersecurity

Why Crypto?

Crypto is geared for anyone using electronic devices such as computers, tablets, or mobile phones and has little to no knowledge of cybersecurity. Those working with personal or corporate information on internal or external networks will find this course useful.

Course content

Crypto’s training objective is to raise user awareness of the common errors and bad practices associated with computer security. Both personal and corporate IT issues are discussed as well as errors that can lead to compromising valuable data and confidential information.

The videogame has five levels, and Alex, the main character, will have one goal per level, which is equivalent to one virtual day. Every day, the player will perform several actions associated with situations built around the plot.

Each level/day will go deeper into two learning topics, which are structured as follows:

  • Level Learning topics
  • Password management.
  • Social media risks.
  • Risks in the workplace.
  • Removable storage device security.
  • Risks when using public Wi-Fi networks.
  • Mobile device security.
  • Safe browsing practices.
  • Virus/malware identification.
  • Email safety.
  • Social engineering.

What do our customers say?

Other courses included in the platform

More Serious Games

More Serious Games

More Serious Games

More Serious Games

Free Ebooks & Whitepapers

Free ebook

30 infallible strategies to improve the "engagement" of your training

Free ebook

The foolproof checklist for designing a training program that works

Free ebook

16 infallible techniques to train and manage Millenials

Free ebook

How to successfully implement a game-based learning program