Introduction to Offensive Hacking

NxtGen CS Offensive Hacking Header

**This program is now full and is accepting applications for a waitlist**


$249; Payment is due upon registration

Date & Time

June 14 - 17 (Tuesday-Friday), 1 p.m. - 4 p.m. CST

Program Registration


**This program is now full and is collecting registrations for a waitlist. Please enter "WAITLIST" when prompted on your application! Please view our policies and resources page before registration. 



Workshop Overview

This course provides students with the concepts and skills for offensive hacking. Students practice hands-on offensive hacking techniques while in a lab environment. 

Topics covered will include:

  • Topics covered the concept of "red teams"
  • Setup of virtualization environment for penetration testing
  • Setup of Kali Linux along with various tools: Nmap, Aircrack-ng, Wireshark, Metasploit Framework, Burp suite, John the Ripper, Social Engineering Toolkit, and Maltego among others

How You Will Benefit

We will cover the fundamentals of information security from an offensive hacking perspective in this course.

Workshop Objectives

Topics covered include the concept of “red teams,” setup of the virtualization environment for penetration testing, setup of Kali Linux along with various tools, Nmap, Aircrack-ng, Wireshark, Metasploit Framework, Burp suite, John the Ripper, Social Engineering Toolkit, and Maltego, among other topics.

Eligibility and Program Requirements

This cybersecurity course is open to any high school sophomore, junior or senior (ages 14-17) worldwide, as well as those technically advanced incoming freshmen who receive Illinois Tech staff approval. No prerequisite knowledge is required; however, it is recommended that students have some technical knowledge. Students practice hands-on basics techniques and continue into advanced techniques while building small project-based websites and web applications.

Upon registration, students must submit the following in order to confirm enrollment in the program:

  • Program fee
  • Parental consent form, which will be sent by email via DocuSign

Access to a laptop or desktop computer, stable internet access, and the ability to download and install software is required. The program will take place online using the Zoom platform. In order for the program to be as interactive as possible, students are encouraged to use their webcam during the synchronous sessions. Students participating in Illinois Tech online summer programs must be at least 14 years of age to participate. View Zoom privacy policy.

Technology Requirements

This program will require the download and installation of software and the use of video conferencing. To participate, students should plan to use a laptop or desktop computer with the minimum specifications:

  • Access to High-Speed Internet
  • 4 GB minimum and 8 GB recommended of RAM
  • 60-100 GB of hard drive space or larger
  • Webcam and speakers/headset and microphone recommended
  • Windows/Mac OS preferred

Please note that students will not be able to participate fully in the program with Chromebooks, tablets, or cell phones, and their use is not advised. 


The program will be taught by Don Nelson, an adjunct industry professor of information technology and management at Illinois Tech. He is also a senior validation manager, application enablement and was an information security architect, systems engineer, and product manager-IP multimedia subsystem for Alcatel-Lucent and Nokia.