Skill Mapping Table
See how skills from games and shows translate to real-world disciplines and career paths. Every fun activity has professional applications.
Environmental reading, pattern recognition
Extracting location data from visual clues
Navigation & OSINT
OSINT Analyst, Geospatial Intelligence
Geolocate 5 images using only visual clues
Terminal commands, network navigation
Understanding system architecture and traversal
Cybersecurity
Penetration Tester, Security Engineer
Complete OverTheWire Bandit levels 0-10
Logic gates, circuit design
Boolean logic and sequential processing
Computer Science
Hardware Engineer, Systems Architect
Build a calculator in a logic gate simulator
Deductive reasoning, evidence correlation
Building conclusions from incomplete data
Intelligence Analysis
Intelligence Analyst, Investigator
Apply ACH to a historical mystery
Digital behavior analysis, SOCMINT
Understanding online identity patterns
OSINT
OSINT Analyst, Digital Investigator
Map your own username across platforms
Systems optimization, throughput analysis
Designing efficient automated workflows
Systems Engineering
Systems Engineer, DevOps, Automation
Design an automated workflow for a task
Assembly programming, low-level logic
Understanding machine-level computation
Computer Science
Malware Analyst, Reverse Engineer
Write basic assembly in an emulator
Rule manipulation, abstract logic
Reframing problems creatively
Deductive Reasoning
Problem Solving, Research
Document 3 real-world rule-hacking examples
Real hacking techniques, social engineering
Combined technical and human exploitation
Cybersecurity & Social Engineering
Red Team, Security Consultant
Analyze 3 Mr. Robot hacks for accuracy
Micro-observation, rapid deduction
Extracting information from minimal clues
Deductive Reasoning
Investigator, Analyst
20 observations about strangers in public
Pattern recognition, data aggregation
Identifying behaviors from data patterns
Intelligence Analysis
Data Analyst, Intelligence
Study emergent behavior in a system
OpSec, surveillance awareness
Understanding and countering surveillance
OpSec & Privacy
Privacy Consultant, Security
Complete personal threat model
Social engineering, physical security
Exploiting human trust and physical gaps
Social Engineering
Red Team, Physical Pentesting
Identify 3 social engineering pretexts
Nation-state cyber warfare awareness
Understanding advanced persistent threats
Cybersecurity
Threat Intelligence, Malware Analysis
Research Stuxnet methodology