The best defense is a good offense!
Cybercrime is increasing and can strike at any time. Good preparation – in the form of a compass to navigate the online world and sort the real from the fake – is essential to protecting oneself against fraud and other cybersecurity threats.
This course opens students’ eyes to the complex world of cybersecurity. Built around real-world examples and exercises, the course equips students with the knowledge and tools to take action. They learn about proactive defense against online threats and are expected to find solutions using logic and fundamental programming skills, as well as creativity and resourcefulness!
Hackers hack because they love to learn by playing around. Our students are encouraged to do the same!
All classes are designed for small groups to foster a comfortable and fun setting, therefore there is a maximum of 6 students for this course. Sign up early to secure your spot!
NB: Course material may be adapted according to ability and experience of participants in each course
You can also sign up for this course in two alternative formats: online tutoring to move at your speed & deepen your knowledge or in-person camps in Switzerland.
- Course material may be adapted according
to ability and experience of participants in
- Age: 13+
- Skill level: beginner
- No programming experience is required but students should be comfortable with computers.
- A personal laptop and USB key is required
- Completion of a ‘’course familiarity form” allowing instructors to gage the level of the class and fine-tune the planned teaching. (Please note that this is not a test, but rather a way to understand what course content students may already be familiar with)
- Binary – the language of computers, how is it important in cybersecurity?
- Google-Fu – how to ask good questions and do their own recon and research
- Linux – Using hackers’ favorite cybersecurity system
- Cryptography – cracking secret messages and understanding their role on the internet
- Web exploitation – exploring the inner workings of internet and the many ways in which websites can be hacked
- Practical computer safety – how long does it take to crack the password you’re currently using?
- Challenges – Competing in cybersecurity capture the flag
- Images of their choice with their own information hidden in the bits of the image
- Secret messages created with their very own encryption scheme
- Their own vulnerable website for their classmates to try and hack
- A demonstration of them hacking a remote computer for their parents (to reassure them about their new hacker powers!)
A typical day in class – involves games, exercises,
quizzes, framework designs, class discussions and
Learning Management System (LMS) – Together with your instructor, you will be accessing course materials on our “Learn Dash” educational course platform. This platform will give you access to all your course materials, from exercises to evaluations and more.