Cybersecurity: Hack-a-thon Challenge *CLOSED*
Sat. July 14 & Sun. July 15 Mandatory Move-in & Orientation
Class runs July 16 – July 27, 2018
If you enjoy watching “Mr. Robot” or” CSI: Cyber” or you are intrigued by cybersecurity in current events, you’re the ideal student for this program. No one could escape the media attention given to the hacking of the Democratic party emails during the 2016 elections. It is clear that cybersecurity is now at the forefront of our daily lives and the need to secure our computers and systems is increasing exponentially.
Still undecided about taking this program? Rumor has it that there are as many as 200,000 cybersecurity jobs left vacant because there are not enough skilled workers to fill them, which is making cybersecurity one of the hottest career paths.
As the old saying goes, you must “know they enemy”. In order to secure computer systems, you need to learn how hackers think and operate. In this program, students are put through a series of activities to learn how easy or difficult it is to hack a computer system thus learning the skills that would allow them to join the growing community of ethical hackers whose mission is to secure computer and information systems.
The course will end with a mini HACK-A-THON in which students will have to maintain and defend their systems against a multitude of hackers determined to bring their system down! Parents are invited to this event, which will be on July 27 from 2:00pm to 3:00pm. More information will be emailed to parents.
After participating in this class students will be able to:
- Describe why computers and systems are vulnerable to hacking
- Explain why ethical hackers are needed
- Scan a system and identify potential vulnerabilities
- Apply what they have learned to improve the security of computer systems
Please visit our program costs page for more detailed information.
*Program rates are subject to change and will be approved by the board of trustees in March.
*Students must be a minimum of 15 years of age by the orientation and move-in date.
Typical Day (Subject to Change)
|8:30 – 9:00||Introduction/Overview|
|9:00 – 9:30||Lecture/Presentation|
|9:30 – 11:00||Learn the Basics|
|11:00 – 11:15||Break|
|11:15 – 12:30||Hands-On Lab|
|12:30 – 1:30||Lunch|
|1:30 – 3:00||On My Own Hack|
|3:00 – 3:15||Break|
|3:15 – 4:30||Review & Daily Wrap-Up|
Learn the Basics
Students participate in a series of instructional activities, exercises, and tutorials to provide them with the knowledge and skills necessary to perform their work.
Each Hands-On Lab is designed specifically to highlight the topic discussed and guides students through their exercises allowing them to leverage their understanding.
On My Own Hack
Students will have the opportunity to practice what they have learned on their own by working their way through a series of challenges.
Students are required to maintain a cybersecurity journal/diary during this time slot summarizing what they learned in their own words. They will be aided by templates and dialogues to ensure organization and completeness.
Bahram Attaie – Assistant Professor, Syracuse University School of Information Studies
Bahram Attaie is an Assistant Professor of Practice at Syracuse University’s School of Information Studies (iSchool). He has been teaching Information Technology at Syracuse University beginning 1995 at University College. Presently he oversees the activities of the security test bed at the Center for Convergence and Emerging Network Technologies (CCENT) and in 2015 he was the director of the Northeast Collegiate Cybersecurity Defense Competition (NECCDC) hosted by the iSchool. He teaches advanced topics in networking and security both at graduate and undergraduate levels.