CyberFirst Futures explores advanced cyber security threats to devices, apps and software and investigates ways of protecting them. The course is designed to develop an understanding of cyber-attacks by exploring the reasoning and motivation of common attacks. Students explore legislation, typical profiles of those individuals most likely to carry out attacks and apply understanding of ways to protect a network from attack. Introducing 15 to 16 year-olds* to some of the fundamental security challenges faced by commercial and non-commercial organisations, they will extend their knowledge of using personal devices and securing them into an organisational environment, typical of the working environments they may experience in their future careers.
*Students must be 15 or 16 years old (born between 1 September 2002 and 31 August 2003) on the first day of this course.
Each CyberFirst Futures course aims to explore legislation surrounding cyber-crimes, the typical profiles of those individuals most likely to carry out attacks and apply understanding of ways to protect a network from attack in both commercial and non-commercial settings.
Session 1: Exploring the motivation for cyber-attacks
Define and understand the nature of cyber-attacks, the capabilities of cyber criminals, the motivations behind these attacks, the legal implications of cyber-crime and the damage caused to both individuals and business.
Session 2: Protecting yourself from attack
Understand the function of operating systems, good passphrase practice and the use of permissions, rights and encryption to protect your data. Discover how scripts and cookies can be used to collect data about your web browsing and track you online, and understand the different types of fraud and how to avoid them.
Session 3: Developing knowledge and understanding of networks
Take a detailed look at how different types of networks work, the function of common network hardware, the Internet of Things and the devices commonly connected to it. Explore the different types of wireless technology and the security used, and identify good practice to stay safe when using public WiFi.
Session 4: Ways to protect a network from attack
Learn about commonly used services and protocols on a business network, tools to assess vulnerabilities with internet connected devices and different types of firewalls. Look at the security risks and ways to protect data transmission and explore different types of encryption technologies.
Session 5: How to make resources available and secure
Understand the benefits of an intrusion detection system, the concept of defence in depth and the differences between symmetrical, asymmetrical encryption and hashing. Explore cloud technologies and the cyber security risks that surround them.
The exact location of the course will be provided in the joining instructions.
5 days, 4 nights, full board residential
Start time: 10.30am
Finish time: 4.00pm
Places are limited to 50 students.