Hacker Highschool Bob Monroe Researcher Writer and Instructor
Hacker Highschool Bob Monroe Researcher, Writer and Instructor ISECOM/Hacker Highschool www. isecom. org www. hackerhighschool. org 808 398 -5444
Who we are and why we exist The Institute for Security and Open Methodology
Let’s Compare White-collar Salaries and Job Forecast Doctors, Lawyers, Engineers, Professors, Security, Robotics $187 K, $126 K, $132 K, $124 K (Tenured), $98 K, ? Yet 80% of available jobs don’t require a college degree Academics Versus Certifications Versus Real World Experience Why Robotics?
Hacking is Not Illegal Hacking is just a skill set Criminal Hacking is illegal So is Criminal Dentistry Pretty much Criminal anything is It's about INTENT to HARM / TRESPASS But not always: EULA or Nation-State (North Korea)
Why we Teach Teens The first and most important step in building a security culture is to getting teens to the point of being self-aware of how easily they can fail at security. The problem is that those who are new or amateurs at a particular skill set tend to overestimate their ability at that skill, while those who are experts at it are very capable at determining exactly how good they are. What this means to security awareness is that if we can get teens to the point where they no longer overestimate their ability to protect themselves, they will behave in ways that are more cautious, lower their risks, and be more capable of dealing with unknown threats.
Hacking is a Methodology for Learning Hacking is a type of scientific methodology More feeling than formal hypothesis More wonder than curiosity It's a hands-on way to do research (real world experience) You can hack ANYTHING There's no scope The conclusion is change
How do we Teach Lessons include topic introduction, original material, demonstrations, exercises, testable segments, FYH, Game On, teacher segments, live labs, bootable Linux CD and head to head challenges However A teacher is not required since lessons are built to be self taught too
We Don’t Focus on Risk Students should be taught to be aware of and sensitive to their own vulnerability, rather than concentrating on risks and threats. As threats change and come in many forms, there's no way that anyone can learn all the threats, take countermeasures for all threats and watch for all the threats while still function in life and school. Defense in Depth versus Mobius Defense
Lesson Topics Version 2: Lesson 01 - Being a Hacker Lesson 02 - Essential Commands Lesson 03 - Beneath the Internet Lesson 04 - Playing With Daemons Lesson 05 - System Identification Lesson 06 - Hacking Malware Lesson 07 - Attack Analysis Lesson 08 - Forensics Lesson 09 - Hacking Email Lesson 10 - Web Security and Privacy Lesson 11 - Hacking Passwords Drafts Lesson 12 - Social Engineering Lesson 13 - Hacking Clouds Lesson 14 - Database Hacking Lesson 15 - Doxing Lesson 16 - Cracks and Exploits Lesson 17 - Hacking Mobiles Lesson 18 - Hacking Wireless Lesson 19 - Hacking Physical Security Lesson 20 - Hacktivism Lesson 21 - Hacking Cyberbullies Lesson 22 - Hacking Ethics and Laws
Now, Let’s Look at a Single Lesson Writing and teaching based on individual learning abilities
Basic Stats on HHS 6 Million Students 11 Million Downloads 22 Lessons Translated into 12 Languages 200, 000 Downloads a Month All Geared Towards Teaching Teens
Subject Matter Expert: Jace
Pull Back the Curtain to See Who is Behind this Project Pete Herzog, Marta Barcelo, Robert E. Lee, Dr. Fred Cohen, Cor Rosielle, Kim Truett, me and many others
Why Should I Care?
Giving Back to our Future
Help us to Help You Now: Grab Lesson 1: Being a Hacker at www. hackerhighschool. org and read it. Do the exercises. As Soon as Possible: Talk to other school teachers and parents about teaching hacking as a learning skill. Talk with your employer about sponsoring Hacker Highschool. Volunteer some of your time to help us at HHS. Always: Contribute to a better future by helping kids learn to hack. Give back to your community and mentor the next generation.
Hacker Highschool Teaching the next generation of Cyber Security Professionals; Teens Across the Globe
Where all your cool toys? Microcomputer Village 2. 0 Teaching across the globe Changes in technology
Introducing your new nightmare (or job security) Raspberry Pi 3 is now Rpi Zero with half the calories Beagle Bone Board is now Nano. Pi Wi. Fi and Bluetooth is now a single chip (So. C) on another chip (stacked) Power consumption is now below 3. 3 volts and dropping Longevity is measured in months and years instead of days
Questions/Comments Show & Tell segment Bob Monroe Researcher, Writer and Instructor ISECOM/Hacker Highschool bob. monroe@isecom. org 808 398 -5444
Want to Connect with us? http: //www. facebook. com/Hacker. High https: //twitter. com/hackerhigh Join the Hacker Highschool Newsletter http: //hackerhighschool. org/connection. html W: http: //www. isecom. org E: hhs@isecom. org
- Slides: 21