Cybersecurity Course - EXPLO


“One of the main cybersecurity risks is to think they don’t exist.”
—Stephane Nappo

Cybersecurity isn’t just an IT problem; it’s a looming business problem that threatens everything from an individual’s privacy to a country’s electoral system. In this course, inherit a website with the mission of securing it from potential data breaches and outside infiltration.
Start your study by learning basic ciphers that have been used throughout history to encrypt information, and then move on to the modern era of information security. Build the security up around your website, and assume the role of both hacker and security team. Learn to anticipate threats by mapping out known vulnerabilities, run penetration tests to verify your work, and build asymmetric encryption that shores up holes that could be vulnerable to hacking.

Students are required to bring a modern laptop or notebook computer running Windows 7 or greater, OSX X 10.7 or greater, Linux that can connect to the internet wirelessly.

Optional: EXPLO offers a variety of special sessions that focus on different subtopics like the use of Artificial Intelligence in modern cyber warfare. To further your exploration of cybersecurity, you may sign up for these sessions once you are at the program.

Who Should Take This Course?

Whether you tackle challenges analytically or approach things with a creative mindset, this course is ideal for students who enjoy solving puzzles and working with the latest technology. You’ll expose vulnerabilities in a client’s network by hacking it and sharing the holes. Student should also be prepare to navigate the ethical issues in cybersecurity as they dig in to this $1 trillion industry. No previous cybersecurity experience required.

Advisors + Past Speakers

  • Roderick Chambers, Former CIA Officer + Business Threat Intelligence Consultant
  • Trey Herr, Senior Security Strategist, Microsoft and Hoover Institution
  • Juliette Kayyem, CNN National Security Analyst
  • Zara Perumal, Software Engineer, Google
  • Peter Kelly, Certified Ethical Hacker + Software Engineer, Raytheon

Plan your summer


Course Highlights

  • Career Exploration

    Cybersecurity used to be a speciality primarily associated with governments and defense contractors, but it has now become relevant to all industries. Demand is high for specialists, and we’ll look at how to get started in a cybersecurity career.

  • Ethics in Cybersecurity

    Discuss the ethical dilemmas like governments monitoring citizens’ social media activity, employers logging their employees’ keystrokes, and security consultants working with multiple companies and learning about all of their vulnerabilities.

  • Infiltration Exercises

    Complete challenges over the course that will strengthen your coding and security skills — both from the perspective of a “black hat” hacker and the “white hat” security team that stops it.

  • Risk Management + Vulnerability Diagnoses

    Draft risk management assessments that identify website vulnerabilities, providing suggestions that will protect the site from external attacks.

  • Penetration Tests

    Run assessments in real time to discover vulnerabilities and insecurities.

  • Ciphers + Decoding

    Learn to create and decipher coded messages, as well as understand the difference between encoding and encryption.

If you want to learn about cybersecurity, you have to learn the basics. There is no better place than EXPLO where you can learn the basics and have fun doing it.

Advisors + Past Speakers

Roderick Chambers

Former CIA Officer + Business Threat Intelligence Consultant

Roderick Chambers is in the strategic and competitive intelligence field, currently working as a business threat intelligence consultant. With a career at the U.S. Department of State that spanned nearly a decade, Chambers served as an Advisor for the Conference on Disarmament and as a Political/Consular Officer. Taking posts in Geneva, Brazil, and Washington, D.C., Chambers worked on visa fraud, toxic weapons research, security protocols for the World Cup, and the Arms Control Trade Treaty.

Trey Herr

Senior Security Strategist, Microsoft and Hoover Institution

Trey Herr is working with cloud-computing security and supply-chain risk for the Global Security Strategy and Diplomacy team. As a visiting fellow with the Hoover Institution at Stanford University, Trey is working on international cybersecurity and risk. His research focuses on the role of nonstate actors in cybersecurity governance, the proliferation of malware, and the evolving character of risk in cyber insurance. Trey is co-editor of Cyber Insecurity— Navigating the Perils of the Next Information Age. He was previously a post-doctoral fellow with Harvard Kennedy School’s Belfer Cyber Security Project, a nonresident fellow with New America’s Cybersecurity Initiative, and has worked with the Department of Defense to develop a risk-assessment methodology for critical infrastructure. He holds a PhD in political science from George Washington University and a BS in theatre and political science from Northwestern University.

Juliette Kayyem

CNN National Security Analyst

Juliette Kayyem is a national leader in homeland and national security. She is a national security analyst for CNN, and the Faculty Director of the Homeland Security Project at the Harvard Kennedy School of Government, where she is also a lecturer. Kayyem served as President Obama’s Assistant Secretary for Intergovernmental Affairs at the Department of Homeland Security. She is a member of the Trilateral Commission, the Council on Foreign Relations, and the Global Cyber Alliance. In addition, Kayyem was a Pulitzer Prize finalist for editorial columns in The Boston Globe about ending the Pentagon’s combat exclusion rule against women.

Zara Perumal

Software Engineer, Google

Zara Perumal is a Software Engineer at Google who received a Bachelor’s degree in computer science and a Master’s degree in Artificial Intelligence from MIT. Perumal is also on the staff at the Harvard Kennedy School of Government’s project Defending Digital Democracy, which “aims to develop strategies, tools, and technologies to protect democratic processes and systems from cyber and information attacks.”

Peter Kelly

Certified Ethical Hacker + Software Engineer, Raytheon

Peter Kelly is a Principal Software Engineer and Certified Ethical Hacker at Raytheon, where he has worked for 12 years. He has broad technical engineering expertise, including enterprise information sharing, messaging, client-server application architectures, and security. As a certified ethical hacker, Kelly knows how to look for vulnerabilities in IT and engineering systems. Using the same skills as a hacker, Kelly can assess a company’s security risk.