Academic Curriculum

Coronavirus Updates: Click here for more information.

Cyber Camp will not be held in 2021 due to continued COVID-19 capacity restrictions at the University.  We are sorry for the inconvenience, but look forward to hosting Cyber Camp again in Summer 2022.

The computer and information security curriculum includes hands-on labs, daily challenges and an all-day culminating challenge activity that tests the students beyond a simple lesson plan! These real-world scenarios encourage students to look at security from all angles and help them determine if computer and information security is the career field for them. Students gain experience in both Windows and Linux administration, as well as a variety of related topics which have included virtualization, digital forensics, and the importance of physical security. A limited number of students will be selected to participate in the camp.

Windows and Linux

Course content applies to Windows 7, 8, and 10 and Linux and introduces students to systems administration including setting user permissions and local security policy, identifying active processes and services, discovering and analyzing software and network vulnerabilities, and maintaining the local firewall.

Other aspects of cybersecurity

Virtualization – Software that makes computing environments independent of physical infrastructure and comes with its own set of security issues that need to be addressed.

Forensics – It is vitally important for systems administrators and information security personnel to understand where things went wrong. While forensics is its own specialization for a reason, there are basic things everyone should know when systems are suspected of being compromised.

Physical security – When things first went digital, it required specialized talents to retrieve sensitive data from a computer. Now everyone has some computer skills and a higher importance is being placed on physical security to protect access to sensitive information.

Other camp topics include:

  • Data Protection
  • Encryption
  • Event Log Auditing
  • Linux Security
  • Networking
  • Remote Access
  • Research Techniques
  • Sportsmanship
  • System Security Policies
  • Technology Law
  • Windows Client Security
  • Windows Server Roles