2 Weeks / Noncredit

Cybersecurity: Hack-a-thon Challenge

Sat. July 14 & Sun. July 15 mandatory move-in & orientation 

Class runs July 16 – July 27, 2018 

If you enjoy watching Mr. Robot or CSI: Cyber then you’re a perfect candidate for this workshop. TV programs like Mr. Robot and CSI: Cyber have made hacking very trendy and in vogue. Even if you are not a follower of these shows you could not have escaped the 2016 elections and the hack of the Democratic party emails reportedly carried out by Russian hackers. It is clear that cybersecurity is at the forefront of our daily lives and the need to secure our computers and systems is increasing exponentially.

And if you’re still undecided rumor has it that there are as many as 200,000 cybersecurity jobs left vacant because there are not enough skilled workers to fill them which is making cybersecurity one of the hottest career paths.

As the old saying goes “know thy enemy” in order to secure computer systems you need to learn how hackers In this workshop students are put through a set of activities to show how easy or hard it is to hack a computer system and expected to behave ethically.

You might also be interested in Learn to Code! and Intro to Cyber Law

Learning Outcomes

As the old saying “know thy enemy” goes, in order to secure computer systems you need to learn how hackers think and operate.  In this workshop students are put through a series of activities to learn how easy or hard it is to hack a computer system thus learning the skills that would allow them to join the growing community of ethical hackers whose mission is to secure our computer and information systems.

The course will end with a mini HACK-A-THON in which students will have to maintain and defend their systems against a multitude of hackers determined to bring their system down!!

After participating in this class students will be able to:

  • Describe why computers and systems are vulnerable to hacking
  • Explain why ethical hackers are needed
  • Scan a system and identify potential vulnerabilities
  • Apply what they have learned to improve the security of computer systems

Program Costs

Please visit our program costs page for more detailed information.

*Program rates are subject to change and will be approved by the board of trustees in March.

*Students must be 15 years of age by the orientation and move-in date.

Typical Day (Subject to Change)

Time Program/Activity
8:30 – 9:00 Introduction/Overview
9:00 – 9:30 Lecture/Presentation
9:30 – 11:00 Learn the Basics
11:00 – 11:15 Break
11:15 – 12:30 Hands-On Lab
12:30 – 1:30 Lunch
1:30 – 3:00 On My Own Hack
3:00 – 3:15 Break
3:15 – 4:30 Review & Daily Wrap-Up

Learn the Basics

Students participate in a series of instructional activities/exercises as well as tutorials to provide them with the knowledge and skills necessary to perform their work.

Hands-On Lab

Each Hands-On Lab is designed specifically to highlight the topic discussed and guides students through their exercises allowing them to leverage their understanding.

On My Own Hack

Gives students the opportunity to practice what they have learned on their own working their way through a series of challenges.

Daily Wrap-Up

Students are required to maintain a cybersecurity journal/diary during this time slot summarizing what they learned in their own words. They will be aided by templates and dialogues to ensure organization and completeness.

Faculty Bio

Bahram Attaie – Assistant Professor, Syracuse University School of Information Studies

Bahram Attaie is an Assistant Professor of Practice at Syracuse University’s School of Information Studies (iSchool). He has been teaching Information Technology at Syracuse University beginning 1995 at University College. Presently he oversees the activities of the security test bed at the Center for Convergence and Emerging Network Technologies (CCENT) and in 2015 he was the director of the Northeast Collegiate Cybersecurity Defense Competition (NECCDC) hosted by the iSchool. He teaches advanced topics in networking and security both at graduate and undergraduate levels.