Online Program Overview


If you enjoy watching “Mr. Robot” or” CSI: Cyber” or you are intrigued by cybersecurity in current events, you’re the ideal student for this program. No one could escape the media attention given to the hacking of the Democratic party emails during the 2016 elections – and the story continues to unfold. It is clear that cybersecurity is now at the forefront of our daily lives and the need to secure our computers and systems is increasing exponentially.

As the old saying goes, you must “know thy enemy.” In order to secure computer systems, you need to learn how hackers think and operate. In the Cybersecurity program, students are put through a series of activities to learn how easy (or difficult) it is to hack a computer system. These skills will allow them to join the growing community of ethical hackers whose mission is to secure computer and information systems. The core of the learning is via group-based activities, labs and challenges. Students posses a broad spectrum of skills, and they are encouraged to share and spread their knowledge.  Students can also pursue greater individual goals by taking advantage of the provided resources.

Still undecided about taking this program? Rumor has it that there are currently as many as 200,000 cybersecurity jobs left vacant because there are not enough skilled workers to fill them, which is making cybersecurity one of the hottest career paths in the world.

  It was my first time traveling abroad and I really enjoyed every moment in Summer College. Thanks to the program, I was able to experience college life and I made friends from all over the world in one place. Just in two weeks my leadership and personality grew and the Cybersecurity program helped me a lot. I improved my skills and also I found my real interest in what I want to study in the future!  ~ Shahad A., Cybersecurity Summer College student, 2018

Lecture Topics include:

  • Security CIA and Encryption Technologies
  • Internet and Network Security
  • Network-based Attacks and Social Engineering
  • Web and Database Attacks and Mobile Application Security
  • Malware and Scanning for Vulnerabilities
  • Ethical Hacking Reporting and Communication

Program Objectives

  • Learn what are the challenges of cybersecurity
  • Understand ‘Ethical Hacking’
  • Develop a spirit of teamwork
  • Participate in a Hackathon and apply the theory and practical skills they have learned

Learn more about Cybersecurity: Hackathon Challenge:

Program Dates, Times & Details Eligibility Requirements Program Cost Program & Technology Requirements Typical Day Faculty Bio

Program Dates & Details

Session Dates

3-week Session II: July 20 – August 7, 2020
Duration: 3 weeks
Live (Synchronous) Session Times:

  • Choose from 1 of 2 Synchronous Times: 
    • MTWThF, 1:00pm – 2:30pm EST; or
    • MTWThF, 3:00pm – 4:30pm EST


Credit: Noncredit
Grading System: Pass/Fail

Program Capacity

Each section of this class is limited to 30 students.

Eligibility Requirements

Students must be of rising high school sophomore, junior, or senior status – or a 2020 high school graduate. For full Summer College admission requirements, view the Admissions Overview and Eligibility page

Apply Now!

Program Cost

Program Costs:

  • Online ONLY: $2,500

*Please visit our Program Costs page for more detailed information. Program rates are subject to change and will be approved by the board of trustees.  Discounts and scholarships are also available.

Program Requirements

Required Materials and Supplies

  • A laptop or desktop computer with webcam
  • Reliable internet connection
  • Virtual Box install is recommended
  • A smartphone
  • Google docs, slides, sheets (students are provided with an SU Google Drive account)
  • Microsoft Word, Microsoft PowerPoint (Students will be provided when enrolling)
  • Ability to download/read PDF files.

If you have any questions about technology requirements, please email the Summer College office.

Student Expectations

Students are expected to complete all their daily tasks and to be resourceful when experiencing difficulties. In case they run into any problems they should seek quick resolution by reaching out to teaching assistants, the professor or other students.

This is an academically rigorous, college-level program. Students are expected to complete nightly homework assignments and actively participate in group projects. Students are expected to attend all synchronous classes every day, arrive on time, and meet all academic obligations. Free time will vary as each program is unique, as is the subsequent workload.

Typical Day

Tentative Schedule

Students will have live, synchronous class Monday – Friday. The class is entirely hands-on with most of the lectures/presentations taking place during the live synchronous sessions.  The sessions will be recorded so they can be accessed on demand.

They can look forward to the some of the following:

Learn the Basics: Students participate in a series of instructional activities, exercises, and tutorials to provide them with the knowledge and skills necessary to perform their work.

Hands-on Lab: Each Hands-on Lab is designed specifically to highlight the topic discussed and guides students through their exercises allowing them to leverage their understanding.

Hack on My Own: Students will have the opportunity to practice what they have learned on their own by working their way through a series of challenges.

Daily Wrap-up: Students are required to maintain a cybersecurity journal/diary during this time slot summarizing what they learned in their own words. They will be aided by templates and dialogues to ensure organization and completeness.

When class is over, and on weekends, students can look forward to various Summer College virtual activities to meet and connect with other students across the world. Check out our Virtual Events and Activities page for more information!

Faculty Bio

Bahram Attaie – Assistant Professor, Syracuse University School of Information Studies

Bahram Attaie is an assistant professor of practice at Syracuse University’s School of Information Studies (iSchool) and has been teaching Information Technology at Syracuse University since 1995. More recently he has been specializing in cybersecurity, and in 2015 he was the director of the Northeast Collegiate Cybersecurity Defense Competition (NECCDC) hosted by the iSchool. He was also coach of the Syracuse University team that won the 2018 National Cyber Anyalyst Challenge. Although he retired from full time teaching in December of 2017, he remains very active in cybersecurity and continues to teach part time as an adjunct professor.