Cybersecurity for children on the Internet - course 24,000 rubles. from Coddy School of Programming for Children, training 4 modules (months)
Miscellaneous / / December 03, 2023
We all live in an information environment. Computers, tablets, smartphones, video intercoms, social networks, cloud storage, electronic diaries, contactless payment - it is difficult to imagine an area of life that has not yet been penetrated by modern technologies. General informatization can no longer be stopped, and at the same time, the dangers hidden in it should not be ignored. Along with the advantages and opportunities that the latest information technologies give us, special attention should be paid to information security. Dangers on the Internet can befall everyone. But cybersecurity is especially important for children, as they are the most vulnerable to online threats and cyber fraud. According to Kaspersky Lab, Russian children spend significantly more time on the Internet than representatives of the younger generation in Europe and the United States. With the development of the Internet, illegal content is also increasing, cases of aggressive behavior of some users towards others and cyberstalking are becoming more frequent. Many become victims of scams and malware. The cybersecurity course for children from the CODDY school will not only teach you security rules, but will also help you protect your personal data and resist scammers and criminals.
Purpose of the course: Explain the value of private information. Show the methods that scammers use to obtain the necessary data. Learn to protect your secrets. Help make your life safer and more reliable
Information security of children on the Internet
Modern children cannot imagine life without the Internet and gadgets. At the same time, they master new technologies much faster than adults and use information resources more confidently. However, such confidence, combined with a lack of life experience, often becomes the cause of problems. Every type of fraud that exists in the real world also exists on the Internet. Only there it is practically not controlled due to the anonymity of users. Account hacking, phishing, cyberbullying, gambling, unwanted content, suspicious dating, wasting parental money, viruses – these are just a few of the things a child can encounter online Internet. Social networks occupy a special place.
Safety on social networks for children
Most often, children actively use the Internet for communication—social networks and instant messengers account for more than 70% of activities. Officially, social networks can only be used from the age of 14, but children want to have this opportunity much earlier, so they deliberately attribute extra years to themselves when registering an account. At the same time, the child should understand that all information on the Internet is available to almost anyone. This is what attackers take advantage of. Internet safety rules for children are at least the following:
- When registering on websites, forums or social networks, do not enter confidential personal data (address, telephone number, parents’ bank card number, etc.)
- Read the user agreement carefully;
- Less personal photo and video content;
- Do not indicate your location and frequently visited places;
- Do not flaunt your wealth;
- Do not save or periodically change account passwords;
- Be attentive to friend requests and various offers online.
This is just a small part of what a child will learn about safety on social networks for children in our course.
What will a child benefit from taking a full cybersecurity course?
Our teachers are confident that it is better to learn safety from the mistakes of others than from your own. Therefore, the children will be taught how to turn evil into good. This course is not about how to work as a hacker and hack websites for money. On the contrary, our course is aimed at the legality and moral component of any action.
Our goal is to teach how to defend yourself, not how to hack. To do this, it is enough to have a general understanding of hacking methods and be good at using security measures.
Usually, after “playing enough” of a hacker in a lesson under the supervision of a teacher, a child satisfies his interest in destructive hacking. And the methods of protection remain in memory for a lifetime. As is the envy of your peers at your child’s unique experience. Not every adult can boast that they have hacked the most popular social networks and email services, even in class with the permission of the teacher.
The course consists of 4 modules. The first two are designed for children 7-14 years old. These classes will not require computers, because my children and I:
- we will write encryption;
- learn to come up with and remember complex passwords;
- Let's practice social engineering;
- Let's look at the locks in practice.
The third and fourth modules are designed for children aged 11-14 years. During these modules, classes will be taught using computers. We will study in practice:
- structure of viruses;
- website security;
- various information security tools used today in the largest companies;
- security when using payment instruments.
During the cybersecurity course, your child will already be able to advise you and your friends on information security issues. And in a few years, he will be able to easily master and obtain a prestigious and in-demand profession - an information security specialist.
The development of information technology not only gives humanity many new opportunities for progress, but also contributes to the strengthening and emergence of new fraud schemes.
6
coursesCourse teacher:
“Game Programming in Python”, “Programming in JavaScript”, “Ethical Hacker”, “Olympiad Programming”, “Programming in Python3”, “Cyber Security”
Education:
Student at the Immanuel Kant Baltic Federal University, “Mathematical methods for information security.”
Experience:
Speaks C++, C#, Python, JavaScript. I worked on writing websites in Django, created games using the Unity engine, and wrote low-level programs in C++.
Interests:
IT technologies, training, mathematics. "A programming language is only a tool that can create a work of art in the hands of a master."
7
coursesCourse teacher:
“Minecraft: Introduction to Artificial Intelligence”, “Frontend Developer: HTML/CSS/JavaScript Websites”, “Ethical Hacker”, "Harvard CS50 Course", "Python and Machine Learning", "Bots in Python", "Cyber Security", "Game Development in C++", "Creating games in Scratch"
Education:
Immanuel Kant Baltic Federal University, Institute of Physical and Mathematical Sciences and information technology, specialty: “Computer security and mathematical methods of protection information."
Experience:
I became acquainted with programming at the age of 12 and since then I have not stopped developing, improving and deepening my knowledge.
He has extensive experience in the development and development of a wide variety of projects, ranging from highly loaded game servers to programming microcontrollers.
Knows and understands modern programming and, as a generalist, is able to find optimal solutions even in difficult situations.
Interests:
He is engaged in writing scripts and enjoys Japanese fencing, kendo and kenjutsu.
I am convinced that there is nothing more important than self-growth and personal development.
“When we encounter new areas of knowledge, the most difficult thing in studying them is to take the first step, to find a way to overcome our own doubts, uncertainties and fears. Only after a while, looking back, are we able to appreciate the heights to which we managed to rise.”
Module 1
Day one - Secret writing
− Sympathetic ink
− Encryption
− Steganography
− Working as a spy and state secrets
− Login to a locked computer or smartphone
Lesson assignment: try different types of sympathetic ink (milk, citric acid, soda, rice and others).
Day two - Passwords
− Pin envelopes
− Password signs
− Hash, salt
− Mnemonic rules for remembering passwords
Lesson assignment: come up with and remember 5 “strong” passwords.
Day three - Ciphers
− Replacement code
− Number systems
− Frequency analysis of text
Assignment for the lesson: decipher the text.
Day four - Password/cipher cracking
− Caesar Cipher
− Public/private key
− Password hacking by brute force
Module 2
Day one - State Security
− State secret, 1st department
− Protection of a sensitive facility
− Data destruction
− FSB, FSTEC
Lesson assignment: search for an unauthorized WiFi point.
Day two - Castles
− Types of locks, their structure
− Bumping
− Pigibacking
− How to avoid becoming a victim of robbers
Lesson assignment: open the lock with a master key
Day Three - Spying
− Wiretapping, bugs, keyloggers
− How to fool a polygraph
− Jammers
− Substitution of base station
Lesson assignment: creating a fake WiFi access point.
Day Four - Social Engineering
− Mitnik, Shimomura. Battle of wits
− “punch through Yandex”
− DDOS offline
− SMS phishing
− Telephone fraud
Lesson assignment: analysis of phishing emails
Module 3
Day One - Internet Fraud
− Clicking, twisting votes.
− Cybersquatters
− Anonymizers
− Phishing, spam, DDOS
Lesson assignment: boost voting.
Day two - Web vulnerabilities
− SQL injections
− XSS injections
− Two-factor authentication
− Public WiFi – what is the danger?
− Home router – risks and opportunities
Lesson assignment: implement SQL injection
Day three - Interception
− Sniffers
− DLP
− Firewalls
Lesson assignment: Substitution of SSL certificate
Day four - How to catch a scammer
− Incident investigation
− Antifraud
− Processing
− Honey pot
Lesson assignment: creating a honeypot.
Module 4
Day one - Viruses
− Types of viruses
− Exploits
− Virus frameworks
Lesson assignment: creating your own virus (0-bomb).
Day two - Bot networks
− Bot networks – why are they needed?
− How do antivirus companies work?
− Internet of Things
− Hacker groups
Lesson assignment: DDOS
Day three - Hackers
− Anonymity
− Bounty hackers
− White, black, red team
Lesson assignment: network scanning with nmap
Day Four - Security Guards
− Virtualization
− Risk assessment
− Reservation
Lesson assignment: creation of a virus (worm).