Cyber II: 2 Day Cybersecurity Skills Bootcamp II for Youths Aged 13 – 16
This is Part 2 of our hands-on cyber skills bootcamp for youths between 13 to 16 years old to pick up real world cyber skills and to promote their interest in cyber security technologies. Through this intensive intermediate program, youths will learn about computer networking, encryption techniques and basic cyber defence skills. Youths will be taught through extensive hands-on lab sessions where they are brought through the application of technologies taught. At the end of the program, youths will also get an opportunity to participate in a gamified style Capture the Flag (CTF) competition, where they are expected to apply all skills learnt to defend their system.
This class is ideal for secondary school youths who are passionate to learn deep cyber skills and/or considering studying IT or Information Security/Cyber Security in Polytechnics. All participants will be awarded Certificates of Participation.
Topics:
1. Cyber Networking Fundamentals (Day 1 Part 1)
- Recap of Cyber 1
- Recap Linux Command Line (Cyber 1)
- Networking Fundamentals
- Recap Linux Command Line (Cyber 1)
- Understanding and applying different number systems in computing
- Understanding and appreciating various network architecture, standards and protocols
- Understanding different network components and its functions
- Understanding different network topologies and their relevant applications
- Appreciate and understand network addressing
- Lab Exercise: Building a basic Linux based virtual network complete with servers and clients, ensuring that information can be accessed within the network
2. Basic Cryptography and Encoding Concepts (Day 1 Part 2)
- Basic Cryptography
- Appreciating the principles of cryptography
- Appreciating and applying classical cryptographic ciphers
- Understanding the 3 broad modern cryptographic methods
- Appreciating the current trust models used in cryptography
- Briefly understand modern cryptographic algorithms
- Lab Exercise: Appreciating and applying the Pretty Good Privacy (PGP) program
- Lab Exercise: Appreciating and applying cryptographic hash functions
- Lab Exercise: Appreciating and applying encoding techniques
3. Understanding of Attacker Techniques and Windows Security (Day 2 Part 1)
- Recap of Cyber 1
- Recap using Metasploit and exploitation techniques
- Basic Post Exploitation Techniques
- Lab Exercise: Appreciate and understand the purpose and technique of persistent access
- Appreciate and understand the purpose and technique of lateral movement
- Basic Windows Server Deployment & Management
- Lab Exercise: Understanding virtualisation of Windows
- Lab Exercise: Understanding basic Windows tools
- Lab Exercise: Building a basic Windows based virtual network complete with servers and clients
4. Cyber Incidents: Basic Investigative and Response Skills (Day 2 Part 2)
- Basic Investigative and Incident Response Skills
- Lab Exercise: Understanding the basics of Windows Sysinternal suite
- Lab Exercise: Appreciate the identification of indicators of compromise in computer systems
- Lab Exercise: Understand the root cause of compromises and how to remediate them
- CTF Challenge
- Participants are given a file with data
- Participants are given 2 hours to create and setup their own Windows based server
- Participants must use the skills learnt over the two days to secure the file within their networks
- Participants will be paired up to engage in mini CTF challenge where they are expected to try to gain access to the other’s secured files while defending their own server
- The Participant with the greatest number of claimed flags wins the challenge