Cyber Security - Defensive Hacking

NxtGen Cybersecurity Defensive Hacking Header

2020 Program Dates and Times (Pick one)

Session I: June 22-June 26, 3-5 p.m. (Central Time)

Add me to the waitlist

Session II: July 20-July 24, 1-3 p.m. (Central Time)

Add Me to the Waitlist

Cost

$129; Payment is due upon registration

Location

Online

Workshop Overview

This course provides students with the concepts and skills for defensive hacking. Students practice hands-on cybersecurity defensive hacking techniques while in a lab environment. Topics covered will include:

  • The concept of “blue teams”
  • Setup of a virtualization environment for threat assessment testing
  • An overview of attack vectors, including brute force, denial of service, scans, backdoor attacks, and more
  • Concepts and methods for mitigation of risk, including firewalls, intrusion detection systems, and intrusion prevention systems
  • Using scanning tools like Nmap, Wireshark, Dig, NSlookup, and others to protect your network

How You Will Benefit

We will cover the fundamentals of information security from a defensive hacking perspective in this course.

Workshop Objectives

Topics covered include the concept of “blue teams,” setup of the virtualization environment for threat assessments testing, understanding different attack vectors, brute force, denial of service, scans, backdoor attacks, and other topics. Additionally, we will cover concepts and methods for mitigation of risk, firewalls, intrusion detection systems, intrusion prevention systems, using snort, Security Onion, and tools for scanning your network for threats

Eligibility and Program Requirements

This NxtGen IT and Cybersecurity course is open to any high school sophomore, junior, or senior (ages 14-17) worldwide, as well as those technically advanced incoming freshmen who receive Illinois Tech staff approval. No prerequisite knowledge is required; however, It is recommended that students have some technical knowledge. Students practice hands-on basic techniques and continue into advanced techniques while building small project-based websites and web applications.

Upon registration, students must submit the following in order to confirm enrollment in the program:

  • Program fee
  • Parental consent form, which will be sent by email via DocuSign

Access to a laptop or desktop computer, stable internet access, and the ability to download and install software is required. The program will take place online using the Zoom platform. In order for the program to be as interactive as possible, students are encouraged to use their webcam during the synchronous sessions. Students participating in Illinois Tech online summer programs must be at least 14 years of age to participate. View Zoom privacy policy.

Instructors

Session I will be taught by Don Nelson, an adjunct industry professor of information technology and management at Illinois Tech. He is also a senior validation manager, application enablement and was an information security architect, systems engineer, and product manager-IP multimedia subsystem for Alcatel-Lucent and Nokia.

Session II will be taught by Maurice E. Dawson, an assistant professor of cybersecurity and forensics and the director of the Center for Cyber Security and Forensics Education at Illinois Tech. He has written several books on cybersecurity, and conducts research in software assurance, advanced cybersecurity principles, and the internet of things (IoT).