Cybersecurity: Hack-a-thon Challenge
Sat. July 14 & Sun. July 15 mandatory move-in & orientation
Class runs July 16 – July 27, 2018
If you enjoy watching Mr. Robot or CSI: Cyber then you’re a perfect candidate for this workshop. TV programs like Mr. Robot and CSI: Cyber have made hacking very trendy and in vogue. Even if you are not a follower of these shows you could not have escaped the 2016 elections and the hack of the Democratic party emails reportedly carried out by Russian hackers. It is clear that cybersecurity is at the forefront of our daily lives and the need to secure our computers and systems is increasing exponentially.
And if you’re still undecided rumor has it that there are as many as 200,000 cybersecurity jobs left vacant because there are not enough skilled workers to fill them which is making cybersecurity one of the hottest career paths.
As the old saying goes “know thy enemy” in order to secure computer systems you need to learn how hackers In this workshop students are put through a set of activities to show how easy or hard it is to hack a computer system and expected to behave ethically.
As the old saying “know thy enemy” goes, in order to secure computer systems you need to learn how hackers think and operate. In this workshop students are put through a series of activities to learn how easy or hard it is to hack a computer system thus learning the skills that would allow them to join the growing community of ethical hackers whose mission is to secure our computer and information systems.
The course will end with a mini HACK-A-THON in which students will have to maintain and defend their systems against a multitude of hackers determined to bring their system down!!
After participating in this class students will be able to:
- Describe why computers and systems are vulnerable to hacking
- Explain why ethical hackers are needed
- Scan a system and identify potential vulnerabilities
- Apply what they have learned to improve the security of computer systems
Please visit our program costs page for more detailed information.
*Program rates are subject to change and will be approved by the board of trustees in March.
*Students must be 15 years of age by the orientation and move-in date.
Typical Day (Subject to Change)
|8:30 – 9:00||Introduction/Overview|
|9:00 – 9:30||Lecture/Presentation|
|9:30 – 11:00||Learn the Basics|
|11:00 – 11:15||Break|
|11:15 – 12:30||Hands-On Lab|
|12:30 – 1:30||Lunch|
|1:30 – 3:00||On My Own Hack|
|3:00 – 3:15||Break|
|3:15 – 4:30||Review & Daily Wrap-Up|
Learn the Basics
Students participate in a series of instructional activities/exercises as well as tutorials to provide them with the knowledge and skills necessary to perform their work.
Each Hands-On Lab is designed specifically to highlight the topic discussed and guides students through their exercises allowing them to leverage their understanding.
On My Own Hack
Gives students the opportunity to practice what they have learned on their own working their way through a series of challenges.
Students are required to maintain a cybersecurity journal/diary during this time slot summarizing what they learned in their own words. They will be aided by templates and dialogues to ensure organization and completeness.
Bahram Attaie – Assistant Professor, Syracuse University School of Information Studies
Bahram Attaie is an Assistant Professor of Practice at Syracuse University’s School of Information Studies (iSchool). He has been teaching Information Technology at Syracuse University beginning 1995 at University College. Presently he oversees the activities of the security test bed at the Center for Convergence and Emerging Network Technologies (CCENT) and in 2015 he was the director of the Northeast Collegiate Cybersecurity Defense Competition (NECCDC) hosted by the iSchool. He teaches advanced topics in networking and security both at graduate and undergraduate levels.