Ages 13–15 | 5 Days | Full-Day or Half-Day (mornings only)
Write Python exploit scripts, hide data inside images, analyze forensic evidence, and go head-to-head in a Red Team vs. Blue Team showdown. Powered by CodeHS Advanced Cybersecurity.
| Session | Project |
|---|---|
| AM 1 | Implement RSA key generation and message encryption in Python |
| AM 2 | Steganography lab — write a Python script to embed hidden text inside image pixel data |
| PM 1 | Extract hidden messages from provided stego-images; compare LSB techniques |
| PM 2 | Build a secure messaging tool that encrypts, embeds, and decodes secret messages end-to-end |
| Session | Project |
|---|---|
| AM 1 | Malware behavior analysis — dissect simulated malware logs in Python, flag IOCs |
| AM 2 | XSS & CSRF exploitation lab — craft payloads against a test app, then code defenses |
| PM 1 | Write Python intrusion-detection rules that parse network logs and alert on anomalies |
| PM 2 | Network attack simulation — detect port scans, brute-force attempts, and data exfiltration |
| Session | Project |
|---|---|
| AM 1 | Log analysis with Python — parse auth logs, correlate timestamps, identify breach timeline |
| AM 2 | EXIF & metadata forensics — extract GPS, device, and edit-history data from images and documents |
| PM 1 | File carving & recovery — write a script to recover deleted files from a disk image |
| PM 2 | Forensic case study — assemble evidence from logs, metadata, and network captures into a incident report |
| Session | Project |
|---|---|
| AM 1 | VPN & tunneling — configure an encrypted tunnel; compare protocols |
| AM 2 | Python reconnaissance scripting — port scanner, banner grabber, subdomain enumerator |
| PM 1 | Vulnerability assessment — scan a target VM, rank findings by CVSS severity |
| PM 2 | Write a penetration-test report with findings, evidence, and remediation steps |
| Session | Project |
|---|---|
| AM 1 | Red Team prep — build attack scripts (recon, exploit, persistence) |
| AM 2 | Blue Team prep — deploy monitoring, write detection rules, harden services |
| PM 1 | Live Red vs. Blue competition on an isolated network |
| PM 2 | Debrief — teams present attack chains and defense strategies; write a security policy |
Morning sessions (AM 1 & AM 2) each day cover advanced crypto, attack/defense coding, forensic analysis, recon scripting, and the Red vs. Blue prep as a self-contained experience.
