Cyber In Minecraft

‘Cyber in Minecraft’ is a cyber security credential program with supporting curriculum, delivered through Minecraft Education that immerse students in a Minecraft world to develop and prove their cyber security skills.

Cyber in Minecraft: Expert Exam

Exam Information

The Cyber in Minecraft Expert Exam is an industry-recognized global certification which enables learners to prove their cybersecurity skills.

Cybersecurity skills are in demand globally. It is a critical skillset in today’s online world and roles in cybersecurity are available in all industries.

How to buy

Site licenses are available for schools to provide this certification to their students.

Individual exams are also available to be purchased by anyone at a cost of US$100.

Preparing for the Exam

Prodigy Learning’s certifications are designed to test mastery of the objective domains. It is recommended that candidates undertake approx. 150 hours of instruction or hands-on experience with cybersecurity topics before taking this exam.


Educators may use the curriculum of their choice to prepare students for the exam. While Prodigy Learning recommends the supporting Cyber in Minecraft learning pathway, the languages and technologies being assessed are industry standard and available outside of Minecraft. The certification exam itself, does not require use, licensing or knowledge of Minecraft.  Educators may choose to use other materials that cover the relevant objective domains – e.g.,, other online curriculum or the educator’s own resources.

Practice Test

A standalone practice test is also available to prepare candidates for the exam.

Exam Details

Delivery method: Online computer-based delivery via Prodigy Learning Portal
Time: 50 minutes
# of questions: 30
Pass mark: 70%
Question format: Multiple choice & drag and drop
Exam version: v1.0
Retake policy: 24 hours after 1st attempt, 14 days for subsequent attempts per exam policies and procedures.

Cyber in Minecraft: Expert Exam Objective Domain

This exam tests your knowledge of cybersecurity in the areas listed below.

It is recommended that candidates undertake approx. 150 hours of instruction or hands-on experience with cybersecurity topics before taking this exam.

The percentage values are indicative of the breakdown of the content of the exam – the higher the percentage, the greater number of questions you are likely to see on the exam relating to that area.

Networking (10%)


  • Understand the difference between local and online
  • Describe and be able to differentiate between network topologies (LAN and WAN)

Networking Hardware

  • Describe the components that make up a Local Area Network (NIC, Switch, Router etc)
  • Identify a MAC address and understand its relevance to network components (inc it being unique)
  • Understand and create network diagrams

Networking Protocols

  • Identify online services such as email, video streaming, storage etc
  • Describe and identify the difference between the HTTP and HTTPS protocols
  • Describe and identify other network protocols such as TCP, UDP and their use in online services such as email, video and gaming
  • Identify an IPv4 and v6 address and understand the difference between Public and Private IP address ranges
  • Understand the 7 layers of the OSI model
  • Describe the roles of the layers of the OSI model and their relationships
  • Understand, describe and compare various TCP and UDP network protocols
  • Identify the risks associated with common TCP and UDP protocols

Hardware & Operating Systems (10%)

Computer Hardware

  • Identify and describe various computer hardware (monitor, keyboard, mouse, webcam, printer, laptop, tablet, etc)
  • Identify and describe various hardware connectivity methods (USB ports, Bluetooth, etc)
  • Describe Bring Your Own Device
    Describe the dangers that can be in hardware such as keyloggers, USB drives with scripts etc
  • Describe and identify methods of compromising security and how to protect against
  • Understand the implications of a malicious incident

Operating Systems

  • Understand what an operating system is and its role
  • Differentiate between various operating systems
  • Understand the role of operating system updates and their importance
  • Understand methods for securing/hardening an operating system

Cloud Computing

  • Identify and describe Software As A Service
  • Understand the importance of being safe online and identify best practices
  • Describe and identify cloud computing models (public, private, etc)
  • Identify and understand the differences between, SaaS, PaaS and IaaS and their appropriate use cases
  • Understand and describe the risks associated with common cloud computing services

Internet of Things

  • Understand what an IoT device is and common use cases
  • Describe and understand that IoT devices collect and share huge amounts of data globally
  • Identify common IoT devices
  • Understand and describe the risks and benefits of IoT
  • Understand the vulnerabilities associated with IoT devices

Software (10%)

Software Applications

  • Identify and understand the function of various software applications
  • Understand the difference between operating systems and applications
  • Understand what malware is
  • Understand the role of security software (antivirus, antimalware, firewalls, web filter etc)
  • Understand various software applications used to analyse, protect against, and use in a cyber attack
  • Understand the importance of logging and (central) analysis of log files

Coding and Scripting

  • Understand the role of code in software applications
  • Understand that code can be changed which will produce a different result
  • Understand the role of scraping (malicious and non-malicious)
  • Describe and identify different scripting languages
  • Understand how to protect against malicious code

Software Updates

  • Understand software updates and patches
  • Understand the importance of software updates
  • Understand and describe examples of vulnerabilities that can be present due to not keeping software and operating systems up to date
  • Understand automatic updating along with its advantages and disadvantages

Digital Citizenship (15%)

Personally Identifiable Information (PII)

  • Understand what privacy is and what information is OK to share
  • Understand what personally identifiable information is and how to keep secure
  • Understand the risks and benefits of sharing PII
  • Understand how PII can be disclosed
  • Describe the potential impact of exposing PII online
  • Understand what a data breach is
  • Understand and describe the risks and impact of a data breach to an organization

Digital Footprint

  • Understand what good and bad online behavior is
  • Describe what a digital footprint is
    Understand how a digital footprint can be harmful
  • Understand how data can be gathered by third parties to create a digital footprint (app, location, web history, etc)
  • Understand that once information is online it may not be possible to fully remove
  • Understand and describe the potential implications of a digital footprint (positive and negative, ethical, financial, etc)


  • Understand what cyberbullying is and recognize it taking place
  • Understand what actions can be taken to prevent cyberbullying
  • Understand what actions can be taken when discovering cyberbullying
  • Demonstrate how to reduce or prevent cyberbullying

Ethics & Legal Issues (15%)


  • Understand and identify unsafe content such as malicious links or emails
  • Understand and describe what a cyber attack is and reference recent cyber attacks
  • Understand what ethical hacking is
  • Understand what malicious hacking is
  • Understand and describe how integrity and reputation can be affected by actions taken online


  • Understand proper and improper use of devices
  • Understand how devices can be used with good and bad intentions
  • Understand and describe different types of threat actors
  • Understand and describe the motive of various types of threat actors

Intellectual Property (IP)

  • Understand what copyright is and how it can be equated to ownership
  • Understand and describe how copyright relates to fair use
  • Understand what Creative Commons License is and the types available
  • Understand the differences between trademark, copyright, patent, etc
  • Understand and describe who owns content when content is remixed

Laws & Regulations

  • Understand the potential implications of actions online and their real-world consequences
  • Understand and describe how safety is protected online though policies and laws
  • Understand and describe laws that relate to cybersecurity in the US
  • Understand and describe international cybersecurity laws and regulations

User Agreements

  • Understand and describe how Acceptable Use Policies are designed to protect the user
  • Understand and describe agreements such as AUPs, Terms of Service and End User License Agreements (EULA)
  • Understand how some agreements favor companies over individuals and vice-versa

Security (20%)

CIA Triad

  • Understand what confidentiality, integrity and availability are
  • Understand and describe concepts related to CIA such as authentication and encryption
  • Describe a scenario where a part of the CIA Triad has failed
  • Understand the three states of data
  • Understand and describe the relationship between the CIA Triad and the three states of data

Access Control

  • Understand what privileged data is
  • Understand and describe different levels of authority and the data they may require access to
  • Understand what access control is
  • Understand the principle of least privilege
  • Understand an access control list

Data Security

  • Understand that data can be changed by mistake or on purpose and how it can be altered
  • Understand and describe the threats to data in each of the three states of data
  • Understand and describe measures available to protect data in each of the three states of data

Threats and Vulnerabilities

  • Understand and describe what malware is and how it could be used and how to respond
  • Understand and describe email threats and how to respond
  • Understand and describe how threats and attacks may be used against individuals and organizations


  • Understand what cryptography is and how it protects information
  • Understand and describe how simple (Caesar cypher etc) and more complex (Enigma etc) encryption methods work
  • Understand what encoding is and how it can benefit encryption
  • Understand and discuss scenarios where there is a need for encryption
  • Understand the difference between symmetric and asymmetric encryption
  • Understand public and private key encryption


  • Understand and describe the characteristics of a good/strong password
  • Understand and describe authentication and authorization and the difference between the two
  • Understand and describe the various method of authentication such as passwords, biometrics, multi-factor authentication
  • Understand and describe authentication using certificates

Network & Physical Security (20%)

Securing Networks

  • Understand and describe how Defense in Depth can be implemented to secure networks
  • Understand firewalls and how they use allow and block lists
  • Describe how network hardware components and their configuration can be used to implement Defense in Depth
  • Describe and understand network segmentation and how it can secure networks
  • Understand and describe how Defense in Depth can be implemented to secure networks

Network Threats and Vulnerabilities

  • Describe different methods of exchanging information online
  • Understand and describe potential vulnerabilities when exchanging information online
  • Understand and describe different types of malicious actions (malware, social engineering etc)
  • Understand and describe attacks and how they can be responded to

Physical Threats and Vulnerabilities

  • Understand and describe physical security measures and how they relate to cybersecurity
  • Understand the need to protect places and people using physical means
  • Understand and describe how malicious actions may threaten physical security
  • Understand and describe the various types of attack that threaten physical security

Access Control

  • Understand identity verification
  • Understand physical security controls
  • Understand and describe how physical security controls can introduce Defense in Depth
  • Understand and describe how different physical security controls are appropriate in different scenarios

Get Set Up

Exam Accommodations

We are committed to ensure that our exams are accessible to all. Should you require an accommodation for an exam please contact Accommodations may include extra time or a separate testing room for the candidate.

Accommodations are considered on a case-by-case basis and should be submitted at least 2 weeks prior to the desired testing time. Further information can be found in our exam policies and procedures.


Proctoring Exams

All testing should be performed in an area where candidates will not be disrupted during testing. It is preferable that testing is performed in a dedicated testing room but if this is not available testing may be performed in a classroom.

An authorised proctor must verify the identity of all test candidates and start their exam.
Teachers can apply to become exam proctors via the Prodigy Learning Portal.

Further information can be found in our exam policies and procedures.

Find a Test Center

How To Become a Test Center