Cyber Defense Lab

Cyber Defense Lab

$599.99
7/20/2026 - 7/24/2026 | Ages 15-18 | Cybersecurity
Session Time
Gaming Option (Exploration Time)
Camper's Name
Enter your text
Camper's Age
Enter your text
Save this product for later
Have questions?
Cyber Defense Lab
Camper's Age: Ages 15-18
Camp Topic: Science
Camp Week: Week 8 (July 20-24)
Gaming: No gaming

Cyber Defense Lab

Ages 13–15 | 5 Days | Full-Day or Half-Day (mornings only)

Write Python exploit scripts, hide data inside images, analyze forensic evidence, and go head-to-head in a Red Team vs. Blue Team showdown. Powered by CodeHS Advanced Cybersecurity.

Day 1 — Advanced Crypto & Steganography

Session Project
AM 1 Implement RSA key generation and message encryption in Python
AM 2 Steganography lab — write a Python script to embed hidden text inside image pixel data
PM 1 Extract hidden messages from provided stego-images; compare LSB techniques
PM 2 Build a secure messaging tool that encrypts, embeds, and decodes secret messages end-to-end

Day 2 — Cyber Attack & Defense

Session Project
AM 1 Malware behavior analysis — dissect simulated malware logs in Python, flag IOCs
AM 2 XSS & CSRF exploitation lab — craft payloads against a test app, then code defenses
PM 1 Write Python intrusion-detection rules that parse network logs and alert on anomalies
PM 2 Network attack simulation — detect port scans, brute-force attempts, and data exfiltration

Day 3 — Digital Forensics

Session Project
AM 1 Log analysis with Python — parse auth logs, correlate timestamps, identify breach timeline
AM 2 EXIF & metadata forensics — extract GPS, device, and edit-history data from images and documents
PM 1 File carving & recovery — write a script to recover deleted files from a disk image
PM 2 Forensic case study — assemble evidence from logs, metadata, and network captures into a incident report

Day 4 — Network Infrastructure & Pen Testing

Session Project
AM 1 VPN & tunneling — configure an encrypted tunnel; compare protocols
AM 2 Python reconnaissance scripting — port scanner, banner grabber, subdomain enumerator
PM 1 Vulnerability assessment — scan a target VM, rank findings by CVSS severity
PM 2 Write a penetration-test report with findings, evidence, and remediation steps

Day 5 — Red Team vs. Blue Team

Session Project
AM 1 Red Team prep — build attack scripts (recon, exploit, persistence)
AM 2 Blue Team prep — deploy monitoring, write detection rules, harden services
PM 1 Live Red vs. Blue competition on an isolated network
PM 2 Debrief — teams present attack chains and defense strategies; write a security policy

What You'll Build

  • RSA encryption system in Python
  • Steganography encoder/decoder
  • Secure end-to-end messaging tool
  • Intrusion-detection rule engine
  • Forensic log analyzer & breach timeline
  • EXIF/metadata extraction tool
  • Port scanner & recon toolkit
  • Red Team attack scripts & Blue Team defense monitors

Half-Day Option

Morning sessions (AM 1 & AM 2) each day cover advanced crypto, attack/defense coding, forensic analysis, recon scripting, and the Red vs. Blue prep as a self-contained experience.

Show More
Powered by Lightspeed
Display prices in:USD
Skip to main content
Blue Ridge Boost
Classes for Adults
Classes
Camps
Events
Tutoring
Gift Card
Menu
Enrichment and tutoring in Math and Computing for any student who wants to learn. Led by Ana Nora Evans in Charlottesville, Virginia.
Terms & ConditionsPrivacy PolicyPayment PolicyRefund PolicyAbout UsReport Abuse
Powered by Lightspeed