Ethical Hacking
Fundamentals
Master the mindset of a professional security researcher. Learn to identify vulnerabilities, secure enterprise networks, and build defensive perimeters in this immersive, lab-driven program.
Requirements
- check_circleAge/GradeGrades 9-12 or age 14-18
- check_circlePrerequisitesBasic Python & networking knowledge
- check_circleHardwareLaptop with 16GB RAM recommended
Instructor
With over 15 years in federal cybersecurity, Dr. Thorne brings real-world offensive security tactics to the classroom.
Session Details
Curriculum Breakdown
Reconnaissance
OSINT techniques, footprinting, and advanced scanning methods.
System Penetration
Buffer overflows, privilege escalation, and payload delivery.
Network Exploitation
Wireless security, MITM attacks, and firewall evasion.
Capstone: The Breach
Live simulated penetration test on a fortified corporate subnet.
Secure Your Spot
Only 4 seats remaining for the September cohort.
Hands-on Lab Environments
Every student gets access to a personal, cloud-based "Obsidian" lab environment. Practice attacks in a safe, legal, and isolated network with 24/7 access throughout the program.
Starting Nmap 7.92 ( https://nmap.org ) at 2024-05-20 22:45 UTC
Nmap scan report for scholar-node-alpha (10.0.4.15)
Host is up (0.00045s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu
80/tcp open http Apache httpd 2.4.41
443/tcp open ssl/http Apache httpd 2.4.41
_