Schoolhouse.world: peer tutoring, for free.
Schoolhouse.world: peer tutoring, for free.
Schoolhouse.world: peer tutoring, for free.
Cybersecurity Basics

SAT Score Range

19 sessions

+22

🔥 5 spots left!

About

“Oh no! The hackers are attacking! What do we do?”

Cybersecurity is without a doubt, a necessity of the internet. Without cybersecurity, it would be extremely easy for anyone, even someone with basic knowledge, to gain access to things they aren't suppose to, or to change the original message that is being sent. But what exactly is preventing Hackers, Hacktivists, or cybercriminals from not being able to see confidential information? That is what we will discover, HOW does cybersecurity protect the internet, and the methods that are used in order to do so. Additionally, we will also discover what threats exist, and how people are allowed to get into certain places of the internet. So to requote my previous question.

“Oh no! The hackers are attacking! What do we do?”

By the end, you’ll understand the tools, strategies, and best practices to defend against cyber threats, and you’ll know exactly what to do when attacks happen.

Tutored by

Gent V 🇺🇸

View Profile

Hello, I'm Gent V, currently in high school, and I'm looking forward to teach interesting content that is usually hidden but absolutely has a high-value skills. There is often content that can be beneficial in your life, however, it doesn't reach most platforms. My objective is to try to teach unique skills and knowledge that isn't offered in many corners of the internet. I would be honored to be your teacher.

✋ ATTENDANCE POLICY

1. The classes schedule is every Monday and Friday at 7:45 PM.

2. If you are require to leave the class or you can't make, It is completely fine and I will provide you the additional information that you need. If it is consistent however, I will ask for context just to ensure that you're okay.

3. Make sure to ask questions on anything that isn't clear, as my history teacher says "The only stupid questions is the questions you don't ask."

4. Be respectful towards your comrades, they are people too.

SESSION 1

18

Oct

SESSION 1

Office Hours

Office Hours

Sat 8:30 PM - 9:10 PM UTCOct 18, 8:30 PM - 9:10 PM UTC

This lesson won't take long.

This lesson will be mostly introducing ourselves with basic information, nothing that is needed to be specific. we will define "cybersecurity", with real world examples, and I will try to make you understand how important it is. (Hint: VERY important). After learning about the purpose of cybersecurity, we’ll explore the CIA Triad, a core concept that categorizes the three key parts of cybersecurity and helps us understand how security truly works. (that is also important)

And just to be clear, CIA in this case has nothing to do with the U.S. government lol.
(Extra unrelated note: government or third-party audits are actually pretty cool!)
SESSION 2

25

Oct

SESSION 2

Office Hours

Office Hours

Sat 8:30 PM - 9:40 PM UTCOct 25, 8:30 PM - 9:40 PM UTC

Yes, the general amount of time is 70 minutes since we meet only once a week, but sometimes we might end it early.

This lesson will be right next to what we have learned about the CIA Triad, This will be about the idea of Non-repudiation, as well as the AAA, which go hand and hand with the CIA Triad, Additionally, you will NEED to know what encryption and decryption is. CIA Triad, AAA, Non-repudiation, Encryption and Decryption are core concepts of cybersecurity, KNOW THEM PLEASE!

After all of that is cemented into our brains. I will explain to you what zero trust is, as well as the control and data place. Finally, we will end it off with physical security, because you don't want a group of 12 year olds to gain access to your private information with their Minecraft swords.

I won’t be talking nonstop for 70 minutes straight... I’m not that cruel.
It will be YOU that does some of the talking... sometimes at least.
SESSION 3

1

Nov

SESSION 3

Office Hours

Office Hours

Sat 8:30 PM - 9:40 PM UTCNov 1, 8:30 PM - 9:40 PM UTC

WOAH! The art of deception just so happens to be useful in cybersecurity.

We will go over deception/disruption technology (aka, guide to trick hackers 101), in that we will understand a honeypot, honeynet, and honey file. After that, there will be an important rant about Business processes impacting security operation, in that there are many things that come to consideration when doing both business and cybersecurity at the same time. this will be a great amount of thingy's to learn, but it is needed.
Terms are: - Approval process, Ownership, Stakeholders, Impact analysis, Test results, Backout plan, Maintenance window, and Standard operating procedure.
If you are a cybersecurity intern in the future, you will need to be thinking about these things.

so deception is a bit of trolling for the hackers, business + cybersecurity is IMPORTANT!!!!!!!
SESSION 4

15

Nov

SESSION 4

Office Hours

Office Hours

Sat 9:30 PM - 10:30 PM UTCNov 15, 9:30 PM - 10:30 PM UTC

Those hackers!!!! why are they attacking us?
Basically in this lesson, we will learn about threat actors(types of hackers) and their motives, pretty cool right?

Threat actors: Nation-state, Unskilled attacker, Hacktivist, Insider threat, Organized crime, and Shadow IT,
Motivations: Data exfiltration, Espionage, Service disruption, Blackmail, Financial gain, Philosophical/political beliefs, Ethical, Revenge, Disruption/chaos, and War.
SESSION 5

22

Nov

SESSION 5

Office Hours

Office Hours

Sat 9:30 PM - 10:30 PM UTCNov 22, 9:30 PM - 10:30 PM UTC

This will be about the great world of Linux, so many commands, but so little time (just kidding, but their is a lot of commands, i recommend a pencil/pen and notebook to take notes)
SESSION 6

29

Nov

SESSION 6

Office Hours

Office Hours

Sat 9:30 PM - 10:30 PM UTCNov 29, 9:30 PM - 10:30 PM UTC

All that a cybersecurity guy needs to know about network engineering! (may go into 2 parts, hopefully not)
SESSION 7

14

Dec

SESSION 7

Office Hours

Office Hours

Sun 9:30 PM - 10:30 PM UTCDec 14, 9:30 PM - 10:30 PM UTC

The SOC Basics!

But what is SOC? it stands for Security Operations Center, and it means that you are constantly monitoring, searching, and checking for threats in a network

Basically, we're gonna be learning HOW to take care of threats, of course, it is rather simple to understand the topics of cybersecurity, but what are you going to do when there is a actual threat in your network? (ya know? the hackers!)

This is gonna to be similar to what you expect from a actual cybersecurity job.
SESSION 8

20

Dec

SESSION 8

Office Hours

Office Hours

Sat 9:45 PM - 10:45 PM UTCDec 20, 9:45 PM - 10:45 PM UTC

Cybersecurity is really important, however, it isn’t just “good practice”. It is also about following government policies, but why do government policies even exist? because it is needed for order.

There are certain things that you have to follow by law in cybersecurity, certain information security policies and standards, as well as compliance frameworks that the company needs to follow (EX: ISO 27001, NIST, GDPR)

If a company audit you and finds that your not following policies, lets just say... your company could face fines, legal penalties, loss of customer trust, and you personally could be held accountable depending on your role.

ya, follow the law.
SESSION 9

27

Dec

SESSION 9

Office Hours

Office Hours

Sat 9:30 PM - 10:30 PM UTCDec 27, 9:30 PM - 10:30 PM UTC

This lesson is a bit of the opposite of cybersecurity.

The question is this... How can hackers even hack into website, and find the perfect opportunity to attack in the first place?

Well, we going to be talking about the hacker methods to hack into billion dollar corporations using timing, patience, and reconnaissance.

Understanding these techniques doesn’t make us hackers, it makes us better defenders because WE should expect their every move.
SESSION 10

3

Jan

SESSION 10

Office Hours

Office Hours

Sat 9:30 PM - 10:30 PM UTCJan 3, 9:30 PM - 10:30 PM UTC

Ah! The internet, one of the greatest and most advancing piece of technology, but there is a side that is never to be seen, the deep and dark web.
SESSION 11

10

Jan

SESSION 11

Office Hours

Office Hours

Sat 9:30 PM - 10:15 PM UTCJan 10, 9:30 PM - 10:15 PM UTC

Ah! The internet, one of the greatest and most advancing piece of technology, but there is a side that is never to be seen, the deep and dark web.
SESSION 12

23

Jan

SESSION 12

Office Hours

Office Hours

Fri 9:30 PM - 10:30 PM UTCJan 23, 9:30 PM - 10:30 PM UTC

Risk assessment and mitigation strategies in an organization.

there is no such thing as 0% risk, same how sprays kill 99.9% of bacteria, but not 100%

This will be a shorter class, because I have my CCNA January 4th, so i have to study, but I won't leave you folks out of a class.
SESSION 13

30

Jan

SESSION 13

Office Hours

Office Hours

Fri 9:30 PM - 10:30 PM UTCJan 30, 9:30 PM - 10:30 PM UTC

Social Engineering & Human Factor, you could have the greatest security in the whole world, do NOT let them hack into your brain.

Topics like phishing, baiting, and pretexting will be discussed.
SESSION 14

7

Feb

SESSION 14

Office Hours

Office Hours

Sat 9:30 PM - 9:50 PM UTCFeb 7, 9:30 PM - 9:50 PM UTC

Survey to improve this class.
SESSION 15

21

Feb

SESSION 15

Office Hours

Office Hours

Sat 9:30 PM - 10:30 PM UTCFeb 21, 9:30 PM - 10:30 PM UTC

So say that you wanted a predefined list of things that automatically doesn't allow for certain people to enter into your network.

That is the purpose of ACL, which stands for access control list and it's goal is to prevent certain traffic that isn't allow in the network, there is a stranded and extended ACL.

There will also be networking in this, since you need to know about networking(IP addresses, Protocols) in order to understand ACL.
SESSION 16

28

Feb

SESSION 16

Office Hours

Office Hours

Sat 9:30 PM - 10:30 PM UTCFeb 28, 9:30 PM - 10:30 PM UTC

Review on the CIA Triad and AAA(authentication authorization accounting)

We will be doing GAP ANALYZE!

So I will provide you an image of a building architecture or cybersecurity policy, and your job is to see what is wrong or incorrect with that image.

For example, if it was a image with the password policies and one of the rules was "password must include lowercase and uppercase letters" you could say "there is a GAP!, because a secure password would have numbers, special symbols, and to not include basic words in your password".

ya it's gonna be fun!
SESSION 17

14

Mar

SESSION 17

Office Hours

Office Hours

Sat 8:30 PM - 9:30 PM UTCMar 14, 8:30 PM - 9:30 PM UTC

This session will be a tabletop exercise

Tabletop exercise means we will talk about what to do when you are in a specific scenario.

basically, I will give you guys a hypothetical scenario that is happening inside of the company, such as a cybersecurity branch, phishing email, or physical breach, and we will simply discuss on what to do in the tabletop exercise.

I will put you on the SPOT!
SESSION 18

21

Mar

SESSION 18

Office Hours

Office Hours

Sat 8:30 PM - 9:30 PM UTCMar 21, 8:30 PM - 9:30 PM UTC

There is a vulnerability in everything, your hardware, your software, your applications, your supply chain, even you are a vulnerability to the network.

SOOOOOO, we will be taking a look at the different types of vulnerabilities that exist in a network, and there are so many things that a hacker can exploit.
SESSION 19

28

Mar

SESSION 19

Office Hours

Office Hours

Sat 8:30 PM - 9:30 PM UTCMar 28, 8:30 PM - 9:30 PM UTC

This will be a MOCK INTERVIEW DAY!

so there will not be any slides or anything new that you will be learning about, what we will be doing is that I will ask you questions about you, your communication skills, how you present yourself, and how you explain your abilities.

I will ask you questions about yourself, your skills, and cybersecurity-related scenarios.
Answer as if this is a real job interview. (ya know because you certainly don't want to mess up when you are in a actual interview.)

Public Discussion

Please log in to see discussion on this series.

Oct 18 - Mar 28

24 weeks

20 - 70 mins

/ session

Next session on March 14, 2026