Ages 13–15 | 5 Days | Full-Day or Half-Day (mornings only)
Build ciphers, break codes, exploit vulnerable web apps, and compete in a Capture the Flag challenge — all using real tools and languages. Powered by CodeHS Fundamentals of Cybersecurity.
| Session | Project |
|---|---|
| AM 1 | Code a Caesar cipher encoder/decoder in JavaScript |
| AM 2 | Implement a Vigenère cipher; crack sample ciphertext |
| PM 1 | Build a SHA-256 password hasher; test with rainbow-table lookups |
| PM 2 | Symmetric vs. asymmetric key exchange — simulate Diffie-Hellman in code |
| Session | Project |
|---|---|
| AM 1 | Linux CLI crash course — navigate, create, move, and permission files |
| AM 2 | Write a Bash script that audits user accounts and flags weak permissions |
| PM 1 | Binary & hex deep dive — build a number-base converter |
| PM 2 | IP addressing & subnetting — code a subnet calculator |
| Session | Project |
|---|---|
| AM 1 | SQL fundamentals — write queries to search, filter, and join tables |
| AM 2 | SQL injection lab — exploit a vulnerable login form, then patch it |
| PM 1 | XSS attack lab — inject scripts into a test page, then sanitize inputs |
| PM 2 | Build a secure login page applying input validation and parameterized queries |
| Session | Project |
|---|---|
| AM 1 | Packet analysis — inspect HTTP vs. HTTPS traffic in a simulated capture |
| AM 2 | Write firewall rules to block malicious traffic patterns |
| PM 1 | CodeHS Escape Room project — solve crypto and networking puzzles to "escape" |
| PM 2 | CTF prep — tools, techniques, and practice challenges |
| Session | Project |
|---|---|
| AM 1 | CTF Round 1 — Cryptography & Steganography challenges |
| AM 2 | CTF Round 2 — Web Exploitation & SQL challenges |
| PM 1 | CTF Round 3 — Network & Forensics challenges |
| PM 2 | Scoreboard reveal, solution walkthroughs, award ceremony |
Morning sessions (AM 1 & AM 2) each day cover the core crypto, CLI, SQL, networking, and CTF content as a self-contained experience.
