• 9:00 am – 10:00 am: Guest Speaker
  • 10:00 am – 11:00 am: Math and Science Academics [10 groups of 5]
  • 11:00 am – 12:00 noon: Active/Project-based Cyber Activities
  • 12:00 noon – 1:00 pm: Lunch
  • 1:00 pm – 3:00 pm: Active-Learning-Project-based Cyber Activities
  • 3:00 pm – 4:00 pm: Professional Development. – Presentation Techniques
  • Adjourn

Students will be exposed to programming concepts and security through the usage of modern day APIs and mobile applications they are familiar with. Instead of the traditional approach of being lectured on the theory and fundamentals of computer science, a series of engaging and immersive activities are planned. Each week builds off of previous concepts, and is designed to reinforce programming skills starting from a very basic level and gradually progressing to more advanced concepts over the weeks. It’s understood that this may be the first time many of the students are exposed to programming. With that in consideration, the weeks are more focused on problem solving, and tweaking code in a guided manner as opposed to the pure semantics and core concepts that are needed for writing robust programs. Given popularity, and ease of use, the following programming languages will be heavily leveraged: HTML5, CSS3, NodeJS. Each week has been designed to align with one of the topics of Office of Naval Research Code 31 C4ISR Objectives. The topics provide exposure to secure communications, to image analysis.

October 11th, 2014: Week 1- Secure Chat Server with an Intelligent Bot

The first week will kick-off with the fundamentals of network security. Many students are familiar with text messaging, and mobile applications such as Snapchat. However, they are most likely unaware of the security that may or may not exist behind them. This week will focus on capturing network traffic of web clients to show how data is sent unencrypted vs encrypted. The week is geared towards gaining exposure to NODEJS (JavaScript based programming language), the internet, and concepts behind TCP/IP and the fundamentals of the Web.

  • Network / Wireshark Analysis - Monitoring traffic in real-time to see unencrypted data
  • Reconstruction of Packet Payloads
  • Port/Protocol Discussion
  • An introduction to artificial intelligence

November 8th., 2014: Week 2 - Learning HTML5/CSS through page scraping and hosting the site from NODEJS.

The second week continues the use of NODEJS to gain exposure of hosting websites. Instead of traditional lecture of the semantics of writing code, students will learn how to copy websites. From these copies they’ll learn through trial and error on how to modify pre-existing content. The focus will be on the dangers of phishing sites that target gmail and facebook. Students will develop websites to capture information

  • Introduction to web programming / hosting
  • Programming exercise designed to show the dangers of phising sites on the internet
  • The importance of using different passwords for different websites

December 6th., 2014: Week 3 - Fundamentals of Password Cracking and Code Breaking with an Introduction to Databases

This week continues on the thread of passwords, with a deep dive on the importance of strong passwords. Students will learn how to create a password generator and the dangers behind short passwords.

  • Discussion around dictionary files
  • What it means to create a strong password
  • A discussion around hash functions and how to securely store passwords

January 10th., 2015: Week 4 - WIFI / RF Cracking (GSM)

This week will discuss the fundamentals behind signal intelligence cracking. The students will explore different technologies related to jamming of signals, as well as interception. This week is focused on the importance of securing one’s network, and the dangers of communicating sensitive information.

  • Students will learn how WEP encryption is easily cracked will modern day technology
  • Students will gain exposure to low cost software defined radios to do signal analysis
  • Students will gain an understanding of the components of cellular communication such as GSM with IMSI, and IMEI fields