The FunTech Cyber Security course teaches 12 to 16 years old how to hack in an ethical and responsible manner. It runs as a day camp or residential camp over the summer months. It’s the ideal hacking course for 13-year-olds who can learn to hack responsibly whilst learning about cyber security weaknesses.
The ethical hacking classes start by teaching your child about security of the Linux operating system. It then moves onto networking lessons, before being taught how to exploit machines and getting access with password cracking and cryptography.
Over the course of the hacking course week, they will also be challenged with problem solving tasks that could open the mind to limitless possibilities.
Understandably, you might be concerned that your child has expressed an interest in hacking give the potential legal ramifications. Let us put your mind at ease: the FunTech hacking course for kids is focussed on “ethical” hacking, and nothing illegal.
Can a 13-year-old learn ethical hacking?
Yes, the FunTech Cyber Security classes are the ideal 5 day course for kids who want to become cybersecurity enthusiasts at the ages of 12, 13, 14, 15, and 16 years.
But what is ethical hacking?
Ethical hacking is where the hacker is given permission to try to hack into a computer system to identify and potential security flaws. They are asked to mimic what a malicious hacker would try to do. By making an authorized hacking attempt in an ethical manner, it means organisations can fix any security vulnerabilities before rogue hackers can exploit them.
As you can imagine, the demand for hacking skills is on the rise. Business and organisations need ethical hackers to help them protect computer systems, applications, and data.
An ethical hacker will sometimes be known as a “white hat” hacker, and will follow key concepts such as staying legal, reporting any vulnerabilities, respecting privacy and data sensitivity.
Want to know more?
Click here for details of the Cyber Security course.
What your child will learn:
- Linux Operating System (File Management, Accessibility, Command Line)
- Issuing Commands
- Difference between Admin and User Accounts
- Networking Concepts (IP/mac Addresses, Ports)
- Networking Services (ssh, nfs, smb, ftp, http/https)
- Passwords and Cryptography
- Hashing vs. Encrypting
- Exploiting Machines
Keep me informed
Be the first to know about Flash and Early Bird Sales as well as new courses, summer locations and more.KEEP ME INFORMED