“One of the main cybersecurity risks is to think they don’t exist.”
Cybersecurity isn’t just an IT problem; it’s a looming business problem that threatens everything from an individual’s privacy to a country’s electoral system. In this course, inherit a website with the mission of securing it from potential data breaches and outside infiltration.
Start your study by learning basic ciphers that have been used throughout history to encrypt information, and then move on to the modern era of information security. Build the security up around your website, and assume the role of both hacker and security team. Learn to anticipate threats by mapping out known vulnerabilities, run penetration tests to verify your work, and build asymmetric encryption that shores up holes that could be vulnerable to hacking.
Students are required to bring a modern laptop or notebook computer running Windows 7 or greater, OSX X 10.7 or greater, Linux that can connect to the internet wirelessly.
Optional: EXPLO offers a variety of special sessions that focus on different subtopics like the use of Artificial Intelligence in modern cyber warfare. To further your exploration of cybersecurity, you may sign up for these sessions once you are at the program.
Whether you tackle challenges analytically or approach things with a creative mindset, this course is ideal for students who enjoy solving puzzles and working with the latest technology. You’ll expose vulnerabilities in a client’s network by hacking it and sharing the holes. Student should also be prepare to navigate the ethical issues in cybersecurity as they dig in to this $1 trillion industry. No previous cybersecurity experience required.
Cybersecurity used to be a speciality primarily associated with governments and defense contractors, but it has now become relevant to all industries. Demand is high for specialists, and we’ll look at how to get started in a cybersecurity career.
Ethics in Cybersecurity
Discuss the ethical dilemmas like governments monitoring citizens’ social media activity, employers logging their employees’ keystrokes, and security consultants working with multiple companies and learning about all of their vulnerabilities.
Complete challenges over the course that will strengthen your coding and security skills — both from the perspective of a “black hat” hacker and the “white hat” security team that stops it.
Risk Management + Vulnerability Diagnoses
Draft risk management assessments that identify website vulnerabilities, providing suggestions that will protect the site from external attacks.
Run assessments in real time to discover vulnerabilities and insecurities.
Ciphers + Decoding
Learn to create and decipher coded messages, as well as understand the difference between encoding and encryption.
Roderick Chambers is in the strategic and competitive intelligence field, currently working as a business threat intelligence consultant. With a career at the U.S. Department of State that spanned nearly a decade, Chambers served as an Advisor for the Conference on Disarmament and as a Political/Consular Officer. Taking posts in Geneva, Brazil, and Washington, D.C., Chambers worked on visa fraud, toxic weapons research, security protocols for the World Cup, and the Arms Control Trade Treaty.
Trey Herr is working with cloud-computing security and supply-chain risk for the Global Security Strategy and Diplomacy team. As a visiting fellow with the Hoover Institution at Stanford University, Trey is working on international cybersecurity and risk. His research focuses on the role of nonstate actors in cybersecurity governance, the proliferation of malware, and the evolving character of risk in cyber insurance. Trey is co-editor of Cyber Insecurity— Navigating the Perils of the Next Information Age. He was previously a post-doctoral fellow with Harvard Kennedy School’s Belfer Cyber Security Project, a nonresident fellow with New America’s Cybersecurity Initiative, and has worked with the Department of Defense to develop a risk-assessment methodology for critical infrastructure. He holds a PhD in political science from George Washington University and a BS in theatre and political science from Northwestern University.
Juliette Kayyem is a national leader in homeland and national security. She is a national security analyst for CNN, and the Faculty Director of the Homeland Security Project at the Harvard Kennedy School of Government, where she is also a lecturer. Kayyem served as President Obama’s Assistant Secretary for Intergovernmental Affairs at the Department of Homeland Security. She is a member of the Trilateral Commission, the Council on Foreign Relations, and the Global Cyber Alliance. In addition, Kayyem was a Pulitzer Prize finalist for editorial columns in The Boston Globe about ending the Pentagon’s combat exclusion rule against women.
Zara Perumal is a Software Engineer at Google who received a Bachelor’s degree in computer science and a Master’s degree in Artificial Intelligence from MIT. Perumal is also on the staff at the Harvard Kennedy School of Government’s project Defending Digital Democracy, which “aims to develop strategies, tools, and technologies to protect democratic processes and systems from cyber and information attacks.”
Peter Kelly is a Principal Software Engineer and Certified Ethical Hacker at Raytheon, where he has worked for 12 years. He has broad technical engineering expertise, including enterprise information sharing, messaging, client-server application architectures, and security. As a certified ethical hacker, Kelly knows how to look for vulnerabilities in IT and engineering systems. Using the same skills as a hacker, Kelly can assess a company’s security risk.
Courses are just one part of your day at EXPLO. Workshops, clubs and societies, trips into town with your friends… We pack a ton into a single day — imagine what you can do in three weeks.
Choose from 40+ trip options each weekend.
Culture. Entertainment. Adventure.
Live, learn, and become lifelong friends
with students from six continents.
At EXPLO, we give you the tools to tackle it head on — from college to career to a life of purpose and meaning.