The best defense is a good offense!
Cybercrime is increasing and can strike at any time. Good preparation – in the form of a compass to navigate the online world and sort the real from the fake – is essential to protecting oneself against fraud and other cybersecurity threats.
This course opens students’ eyes to the complex world of cybersecurity. Built around real-world examples and exercises, the course equips students with the knowledge and tools to take action. They learn about proactive defense against online threats and are expected to find solutions using logic and fundamental programming skills, as well as creativity and resourcefulness!
Hackers hack because they love to learn by playing around. Our students are encouraged to do the same: while receiving some guidance from their instructors, they are expected to teach themselves and their coursemates.
Some courses might not be available at every camp – check your preferred location and dates to view course offering.
This course can welcome a maximum of 6 students. Sign up early to secure your spot!
NB: Course material may be adapted according to ability and experience of participants in each course
Top course (particularly popular)
- Age: 13+
- Skill level: beginner
- No programming experience required, but the student should be comfortable with computers and curious to learn how they work
- Their own laptop and USB key
- Minimum private course duration – 15 hours
- Binary – the fundamental language that computers speak, and how it is important in cybersecurity.
- Google-Fu – how to ask good questions and do their own recon and research
- Linux – how to use the hacker’s favorite cybersecurity system
- Cryptography – crack secret messages and understand how they play a role on the internet
- Web exploitation – how the internet works and many of the ways in which websites can be hacked
- Practical computer safety – how long does it take to crack the password you’re currently using?
- How to compete in cybersecurity capture the flag challenges
- Images of their choice with their own information hidden in the bits of the image
- Secret messages created with their very own encryption scheme
- Their own vulnerable website for their classmates to try and hack
- A demonstration of them hacking a remote computer for their parents (to reassure them about their new hacker powers!)