George Mason University
George Mason University Mason
George Mason University

Pre-college Cybersecurity Program

Kai Zeng, Electrical and Computer Engineering professor

Cyber Physical Lab

In the summer of 2018, Kai Zeng, professor in the Department of Electrical and Computer Engineering, worked with a group of students who developed realtime and lightweight authentication for UAVs to secure the communication between the controller and UAV.

The Future of Cybersecurity is Here.

Prepare for a career in one of the fastest growing fields around with this hands-on intensive Pre-college Cybersecurity program. Middle and high school students to learn how to apply technical skills in cybersecurity careers for the future.

Pre-college Cybersecurity Program

Prepare yourself to translate technical skills in cybersecurity careers. You will take courses focused on cybersecurity for two years, or eight quarters, for 10 weekends in each. Best of all, no background is necessary in technology, because we provide the foundation. Courses include fundamentals of hardware, software, networking, cybersecurity, ethical hacking, and computer forensics. Best of all, no background is necessary in technology, because we provide the foundation then you can this foundation to participate in research in our labs.

List of Courses

Principles of Information Security

Introduces SecSDLC (Security System Development Life Cycle) with emphasis on security investigation, security, design, implementation, maintenance, and change.

Fundamentals of Hardware and Software

Introduces to basic hardware and software, including installing operating systems, hard drives, motherboard, and input / output devices. Students learn how to maintain and optimize operating system and troubleshoot hardware problems. Introduces students to different networking types, mobile devices, and virtualization.

Fundamentals of Networking

Discusses OSI model, how computers find each other on networks, and how data is transported over networks. Introduces basic cabling and network map that can be used in network troubleshooting. Examines how nodes exchange wireless signals and identifies potential obstacles to successful wireless transmission. Explores cloud computing, remote access, and network’s performance due to unified communications. Topics such as network segmentation, virtualization, wide area network, and SCADA systems are elaborated.

Security Awareness

Introduces information security terminology, attacks, and defenses. Discusses personal security, computer security, Internet security, mobile security, and workplace security.

Fundamentals of Cyber Security I

Introduces to application and network-based attacks, including server-side web application attacks, client-server application attacks, impartial overflow attacks, DoS, interception, poisoning, and attacks on access rights. Discusses securing the devices, operating system, and application hardening and patch management. Crypotographic algorithms such as hash, symmetric, and asymmetric are introduced.

Fundamentals of Cyber Security II

Discusses digital certificates, PKI, key management, and cryptographic transport protocol, such as SSL, TLS, SSH, HTTPS, and IPsec. Introduces to NAT, NAC, DMZ, subnetting, WEP, WPS, WPA, WPA2, authentication services and account management.

Ethics in Computing

Introduces professional codes of ethics. Explores “right to privacy” and legal and moral issues concerning privacy. Intellectual property, copyrights, patents, trademarks, copy protection, virus, intrusion, and plagiarism are discussed.

Ethical Hacking I

In-depth introduction to ethical hacking, footprinting, scanning, enumeration, system hacking, trojans, backdoors, viruses, worms, sniffers, social engineering, phishing, DoS, buffer overflows, session hijacking, hacking web servers, web application vulnerability, web-based password cracking techniques, hacking web browsers, SQL injection, and hacking database servers.

Ethical Hacking II

In-depth introduction to linux hacking, Mac OS hacking, hacking routers, cable modems, and firewalls, hacking mobile phones, PDAs, and handheld devices, Bluetooth hacking, RFID hacking, and hacking USB devices.

Ethical Hacking III

In-depth introduction to hacking wireless networks, physical security, evading IDS, firewalls, and detecting honeypots, and cryptography.

Computer Forensics I

In-depth introduction to computer investigation process, first responder procedures, incident handling, and investigative reports. Discusses file systems and hard disks, digital media devices, operating system forensics and boot processes. Includes application password crackers.

Computer Forensics II

In-depth introduction to steganography, data acquisition and duplication, forensic investigation using EnCase and recovering deleted files and deleted partitions.

Computer Forensics III

Investigation of network traffic, web attacks, router forensics, DoS attacks, Internet crime. Explores tracking e-mails and investigating e-mail crime, investigating corporate espionage, trademark and copyright infringement, and sexual harassment incidents. Investigating wireless attacks, iPod, and iPhone forensics.

Penetration Testing

Introduces to reconnaissance, scanning tools, sniffers, TCP/IP vulnerabilities, encryption and password cracking. Explores spoofing, session hijacking, hacking network devices, web and operating system vulnerabilities.

Incident Response and Disaster Recovery

Discusses planning for organization readiness, contingency strategies for IR/DR/BC, incident response planning, detection, decision making, organizing and preparing CSIRT, response strategies, recovery and maintenance. Also explores disaster recovery preparation and implementation, operation and maintenance, and business continuity planning. Covers crisis management and international standards in IR/DR/BC.

Career Readiness

Discusses the culture of higher education. Topics such as accepting personal responsibility, discovering self-motivation, mastering self-management, employing interdependence, gaining self-awareness, adopting life-long learning, developing emotional intelligence, and staying on course to your success are discussed.

Expertise