IN PERSON CAMPS
The best defense is a good offense!
Cybercrime is increasing and can strike at any
time. Good preparation – in the form of a compass
to navigate the online world and sort the real from
the fake – is essential to protecting oneself against
fraud and other cybersecurity threats.
This course opens students’ eyes to the complex
world of cybersecurity. Built around real-world
examples and exercises, the course equips
students with the knowledge and tools to take
action. They learn about proactive defense against
online threats and are expected to find solutions
using logic and fundamental programming skills, as
well as creativity and resourcefulness!
Hackers hack because they love to learn by playing
around. Our students are encouraged to do the
All classes are designed for small groups to foster a
comfortable and fun setting, therefore there is
only a maximum of 6 students for this course. Sign
up early to secure your spot!
NB: Course material may be adapted according to
ability and experience of participants in each
You can also sign up for this course in two alternative formats: online class to benefit from flexible dates, or online tutoring to move at your speed or deepen your knowledge.
- this course may not be available at each
camp location – head over to our
‘locations’ page to check out dates and
- Course material may be adapted
according to ability and experience of
participants in each course
- Age: 13+
- Skill level: beginner
- No programming experience is required
but students should be comfortable with computers.
- A personal laptop and USB key is required
- Binary – the language of computers, how is it important in cybersecurity?
- Google-Fu – how to ask good questions and do their own recon and research
- Linux – Using hackers’ favorite cybersecurity system
- Cryptography – cracking secret messages and understanding their role on the internet
- Web exploitation – exploring the inner workings of internet and the many ways in which websites can be hacked
- Practical computer safety – how long does it take to crack the password you’re currently using?
- Challenges – Competing in cybersecurity capture the flag
- Images of their choice with their own information hidden in the bits of the image
- Secret messages created with their very own encryption scheme
- Their own vulnerable website for their classmates to try and hack
- A demonstration of them hacking a remote computer for their parents (to reassure them about their new hacker powers!)
A typical day in class – involves games, exercises,
quizzes, framework designs, class discussions and