The primary purpose of the GenCyber program is to support the growth of the next generation of cybersecurity experts for the nation. Currently, there is a shortfall in skilled cybersecurity professionals in our Nation. As such it is critical that we meet this shortfall head on by inspiring young people to work in this area as it is critical to our country’s national and economic security as we increasingly become more reliant on cyber-based technology in our daily lives. The Gen- Cyber camps is focused on leveling the playing field through the offering of camps free of charge to all student and teacher participants. Students in elementary, middle and high school have limited exposure to cybersecurity topics. As such GenCyber’s mission is to build a pipeline of cybersecurity professionals for the nation.
The PVMS GenCyber Camp will utilize the First Concepts framework and the following corresponding first concepts that will be included are: defense in depth, confidentiality, integrity, availability, think like an adversary, and keep it simple. Additionally, the following first principles will be used: data hiding, layering, least privilege, domain separation and simplicity. The proposed framework was chosen because the students being targeted for the program are in middle school (6-8), are computer literate, participate in various technology programs, have varied backgrounds, are racially diverse, and have shown interests in similar programs. Students will have a variety of methods to learn the materials, including many hands on activities to augment live demonstrations and will have the opportunity to be inspired by guest speakers that are subject matter experts in the field. The topics will cover a breadth of Cyber security principles, giving the students a holistic view of the subject. The curriculum will go well beyond the teaching of technology by addressing the more human aspects including ethics and human/ computer interaction. For example, students will learn how the strengths of human thinking and automation can be used to detect and exploit weak encryption and other cyber defenses. The students will leave the program with a broad sense of the subject and will be equipped to find the areas that interest them the most to help guide them in their future education.
Monday | Tuesday | Wednesday | Thursday | Friday |
---|---|---|---|---|
8am - 8:30 Breakfast & Opening of the Program; Guest Speaker |
8am - 8:30 Breakfast & Announcements |
8am - 8:30 Breakfast & Announcements |
8am - 8:30 Breakfast & Announcements |
8am - 8:30 Breakfast & Announcements |
8:35 - 9:35 First Concepts of Security |
8:35 - 9:35 Kids and Online Behavior |
8:35 - 9:35 Safety quiz & review |
8:35 - 9:35 Student Discussions and Presentations on cyber security games |
8:35 - 9:35 Network Security Demonstration |
9:35 - 10:35 Ethics of Cybersecurity |
9:35 - 10:35 Safety First; Guest Speaker |
9:35 - 10:35 What is cyber security; Attacks and Defenses Demonstration |
9:35 - 10:35 Guest Speaker |
9:35 - 10:35 Hands on Activities – Network Security |
10:35 - 10:50 Break |
10:35 - 10:50 Break |
10:35 - 10:50 Break |
10:35 - 10:50 Break |
10:35 - 10:50 Break |
10:50 - 11:50 Hands on Activities and student presentations – ethical issues |
10:50 - 11:50 Hands on Activities – drafting an online bill to protect kids |
10:50 - 11:50 Hands on Activities – Designing a cyber security game |
10:50 - 11:50 Network Security |
10:50 - 11:50 Student Presentations on Network Security |
11:50 - 12:00 Break and Dismissal |
11:50 - 12:00 Break and Dismissal |
11:50 - 12:00 Break and Dismissal |
11:50 - 12:00 Break and Dismissal |
11:50 - 12:00 Break and Dismissal |
Monday | Tuesday | Wednesday | Thursday | Friday |
---|---|---|---|---|
8am - 8:30 Breakfast & Announcements |
8am - 8:30 Breakfast & Announcements |
8am - 8:30 Breakfast & Announcements |
8am - 8:30 Breakfast & Announcements |
8am - 8:30 Breakfast & Announcements |
8:35 - 9:35 Principles of Computer Programming and Automation |
8:35 - 9:35 Guest Speaker – Cryptanalyst. What is Cryptography? Case Studies |
8:35 - 9:35 Browser Cookies |
8:35 - 9:35 Attacks and Defenses Demonstrations |
8:35 - 9:35 Overview of Cyber Security & Question and answer session |
9:35 - 10:35 Hands on Activities – Device programming |
9:35 - 10:35 Hands on Activities – Breaking substitution ciphers |
9:35 - 10:35 Social Networks |
9:35 - 10:35 Guest Speaker – Benefits of cyber security |
9:35 - 10:35 Hands on Activities |
10:35 - 10:50 Break |
10:35 - 10:50 Break |
10:35 - 10:50 Break |
10:35 - 10:50 Break |
10:35 - 10:50 Break |
10:50 - 11:50 Data Hiding Games |
10:50 - 11:50 Guest Speaker Online Safety Expert |
10:50 - 11:50 Hands on Activities – Online privacy |
10:50 - 11:50 Cyber Security Quiz & review |
10:50 - 11:50 Assessment & Feedback on GenCyber program |
11:50 - 12:00 Break and Dismissal |
11:50 - 12:00 Break and Dismissal |
11:50 - 12:00 Break and Dismissal |
11:50 - 12:00 Break and Dismissal |
11:50 - 12:00 Break and Dismissal |