Date & Time

Monday 7/12/2021 - Friday 7/16/2021 from 1-4 pm

Due to high demand, this program is now FULL. To join the waitlist please submit registration with the link below. If a spot in the program opens students on the waitlist will be notified via email. 

Program Registration

To register for this program, please create an account in our application portal using the button below. Once you create an account and log in, start a new "Pre-Collegiate Summer Application" and select the program you'd like to register for.




Program Overview

This boot camp provides a more in-depth look at cybersecurity that is targeted at students with prior knowledge of basic cybersecurity concepts. Like the Introduction to Offensive Hacking and Introduction to Defensive Hacking programs, students will practice hands-on offensive and defensive hacking techniques while in a lab environment.

Topics covered will include: 

  • The concept of "red teams", “blue teams”, and "purple teams"
  • Setup of virtualization environment for penetration and threat assessment testing
  • An overview of attack vectors, including brute force, denial of service, scans, backdoor attacks, and more
  • Concepts and methods for mitigation of risk, including firewalls, intrusion detection systems, system hardening, and intrusion prevention systems
  • Setup of Kali Linux along with various tools: Nmap, Aircrack-ng, Wireshark, Metasploit Framework, Burp suite, John the Ripper, Social Engineering Toolkit, and Maltego among others
  • Using scanning tools like Nmap, Wireshark, Dig, NSlookup, and others to understand the security posture of the network

Prerequisite Requirements:

Eligibility and Program Requirements

To successfully participate, students should be familiar with basic computing skills for navigating the command line, familiarization with a virtual player, and knowledge of basic scripting. A few weeks before the program’s start, the Pre-College team will send preparation materials and resources to participating students to complete in advance to familiarize themselves with the topics. We recommend that beginners to cybersecurity participate in the Introduction to Offensive Hacking and Introduction to Defensive Hacking programs. 

Upon registration, students must submit the following in order to confirm enrollment in the program:

  • Program fee
  • Student and parent/guardian consent form, which will be sent by email via DocuSign

Access to a laptop or desktop computer, stable internet access, and the ability to download and install software is required. The program will take place online using the Zoom platform. In order for the program to be as interactive as possible, students are encouraged to use their webcam during the synchronous sessions. Students participating in Illinois Tech online summer programs must be at least 14 years of age to participate. View Zoom privacy policy.

Technology Requirements

This program will require the download and installation of software and the use of video conferencing. To participate, students should plan to use a laptop or desktop computer with the minimum specifications:

  • Access to High-Speed Internet
  • 4 GB minimum and 8 GB recommended of RAM
  • 60-100 GB of hard drive space or larger
  • Webcam and speakers/headset and microphone recommended
  • Windows/Mac OS preferred

Please note that students will not be able to participate fully in the program with Chromebooks, tablets, or cell phones, and their use is not advised. 


Dr. Maurice Dawson is an Assistant Professor of Information Technology and Management within the School of Applied Technology at Illinois Institute of Technology. Additionally, he serves as Director of the National Center for Academic Excellence in Cyber Security Education and responsible for working with the faculty who are members of this center. Before joining academia, he was an engineering manager for unmanned air systems and senior program manager for rotary wing aircraft. He has a Doctor of Computer Science from Colorado Technical University and a Doctor of Philosophy in Cyber Security from the Intelligent Systems Research Centre at London Metropolitan University.