Cyber Crash Course: Unleash Your Tech Skills: Ever wondered how the Internet works? How are files of all types transferred from one device to another? It all starts with connecting devices to each other—better known as “Networking.” In this course, students will explore the fundamentals of networking and delve into cybersecurity essentials: learning to intercept and secure devices through Offensive Security and Defensive Security techniques. Students will also be introduced to Cyber Operations, where they’ll discover how to plan for unlikely incidents, back up data, and recover from attacks.
With a mix of theoretical knowledge and hands-on labs, students will gain insight into how connected systems operate safely and securely in a controlled environment. This course serves as a foundational pathway to a career in cybersecurity, specifically preparing students for roles such as Network Engineer, Incident responder, SOC(Security Operation Center) analyst.
Skills students will acquire include:
- Fundamentals of Networking: Understand how networks connect the world, from local home setups to global infrastructures, showcasing how companies and the IT industry operate and communicate such as (Network topologies, Routers, switches, etc.)
- Network Setup and Configuration: Gain hands-on experience with setting up and configuring networks. (IP addresses, subnetting, etc.)
- Critical Thinking and Analytical Skills: Perform in-depth analysis and network testing using essential networking tools such as (Wireshark, Nmap, etc.)
- Offensive and Defensive Security Techniques: Implementing and understanding security tools and strategies in networks using Windows and Kali Linux.
- This section also includes Intro to Network Security, where students will learn how to secure networks.
- Cyber Resilience Planning: Develop cyber plans such as backup strategies, disaster recovery, contingency planning, and incident response to strengthen resilience through cyber operations.
Finally, students will participate in a Capstone project, where they will be divided into groups and into four distinct roles—Attack, Protect, Detect, and Respond. Each group will work collaboratively to address and resolve a cybersecurity networking incident, applying the full range of skills covered throughout the course.
LUNCH: Students staying for full day or for both morning and afternoon sessions can bring or buy their lunch. All students will eat lunch on Campus in The Commons, a small food court.