Where Cryptography Meets Mystery
Learn cybersecurity through code-breaking challenges. Interactive cipher scenarios for schools, businesses, and individuals.

Created by Navy Cryptologist
Terry Sadler
DECODE
DISCOVER
DEFEND
Platform Features
From beginner-friendly cipher puzzles to advanced cryptanalysis challenges, our platform makes cybersecurity education engaging, measurable, and fun.
Hands-on cipher-breaking challenges teach real cryptography concepts. Students learn Caesar, Vigenère, substitution, ROT13, and rail fence ciphers through interactive mysteries.
Scenarios aligned with CSTA K-12 Computer Science Standards. Three difficulty levels cover grades 6-12 with age-appropriate content and progressive complexity.
Multiplayer game modes for classrooms, corporate team-building, and trade show events. Cryptomasters manage games with real-time leaderboards and QR code integration.
Students earn certificates upon completing each scenario. Track progress, scores, and time across all assignments with detailed analytics for teachers.
Zero-friction student access via class codes — no student accounts or emails required. Designed for K-12 privacy compliance from the ground up.
Companion to "Cybersecurity for Everyone: Secure by Design, Safe by Habits" — extending the book's lessons into interactive, hands-on learning experiences.
Education Scenarios
Each scenario is a self-contained cybersecurity mission guided by Wild Willy, a Navy cryptologist with 41 years of experience.
A vault has been breached. Decode 5 encrypted messages using Caesar and ROT13 ciphers to track the thief and recover the stolen data.
A social engineering attack is underway. Crack Vigenère and substitution ciphers to expose the attacker's plan before it's too late.
A rogue agent is leaking classified information. Use all five cipher types to decode their communications and identify the traitor.
About the Creator

Data Governance & IT Strategy Advisor · Navy Cryptologist (Ret.) · Army Intelligence Specialist (Ret.)
Terry applies 41 years of cryptology and intelligence experience to both corporate cybersecurity and education. Currently serving as a Data Governance and IT Strategy Advisor, he brings military-grade security thinking to private sector challenges.
His 20-year Navy career included multiple training roles—Navy Instructor, Franklin Covey certified facilitator, and Command Training Officer at NSGA Misawa during the 2001 EP-3 incident. He then spent 21 years with the U.S. Army at Fort Polk, Louisiana, in Security and Intelligence roles until his 2025 retirement.
Author of "Cybersecurity for Everyone" (two editions), Terry founded Wild Willy Cipher Academy to teach code-breaking and security thinking through speaking engagements and educational programs alongside his corporate work.
"I spent decades training military intelligence professionals in cryptology, operations security, and effective habits. Now I apply those same methodologies in corporate IT strategy and cybersecurity education. Security isn't just technology—it's how people think and behave."
— Terry Sadler

Secure by Design, Safe by Habits
The companion book that breaks down complex security concepts into practical, everyday advice. No technical background required.
Learn MoreFree
For K-12 Schools
15
Cipher Challenges
5
Cipher Types
100%
COPPA Compliant
The Diamond Kingpin Caper
50 encrypted clues across 4 acts. Decode Caesar, Atbash, ROT13, Vigenère, and substitution ciphers to solve the mystery of the century.
Work through all 50 clues at your own pace. Perfect for honing your cryptanalysis skills.
Enter the game code provided by your Cryptomaster to join an organized event or team challenge.
If your teacher gave you a 6-character code, enter it below to start your cipher mission.