Schoolhouse.world: peer tutoring, for free.
Free SAT® Prep, as part of a research study.
SAT® Bootcamps
Free SAT® Prep, as part of a research study.
Get free help applying to college.
College Admissions Workshops
Get free help applying to college.
1-on-1 conversations on global topics
Dialogues
1-on-1 conversations on global topics
A global network of volunteers.
Explore Tutors
A global network of volunteers.
Level 1: Breaking Into Cybersecurity - Build, Scan, Hack (Hands on)

SAT Score Range

10 sessions

✨ Be the first

About

You know cybersecurity is important. You've heard about hackers, data breaches, and million-dollar ransomware attacks. But where do you actually start?

This is Level 1.Eleven sessions that take you from "I'm interested in cybersecurity" to "I just completed my first security assessment."

Here's what makes this different: we're not spending weeks on theory. Session 1, you're building your hacking lab. Session 4, you're already scanning networks. By Session 6, you're cracking passwords. Everything is hands-on, everything is practical.

Each session follows the same structure: I explain the concept briefly (10-15 minutes max), then we dive into the lab together. You follow along, you make mistakes, you learn by doing. That's how this works.

Topics we'll cover:
→ Setting up your security lab (Kali Linux, VMs, tools)
→ Linux basics that actually matter for security work
→ How networks really work (we'll watch packets move in real-time)
→ Reconnaissance and scanning (your first "hack")
→ Web application structure (how websites actually function)
→ Password security and cracking (theory meets reality)
→ Social engineering fundamentals (the human element)
→ Cryptography essentials (what keeps data safe)

The final two sessions are your project. You'll conduct a complete security assessment of a test environment, Just like the real work.

What you need: A computer capable of running virtual machines, willingness to learn, and about 60-90 minutes per session. No prior experience required. If you can install software and follow instructions, you're ready.

What you don't need: A computer science degree, prior hacking experience, or expensive certifications. Just curiosity and commitment.

By the end of Level 1, you'll have the foundation. You'll understand how systems work, how they break, and how to think about security. More importantly, you'll have actually done it—not just read about it.

This is where it starts. See you in Session 1.

Tutored by

Yusuf M 🇪🇬

View Profile

At 13, I asked a simple question: How do computers work? Now I'm a high school senior, IBM-certified SOC Analyst, specializing in cybersecurity, prompt engineering, and OSINT. I've published research in neuroscience because I see striking parallels between how human brains and digital systems operate—both learn from patterns, both have vulnerabilities that need protection. Chess, sudoku, and cryptography taught me to think logically and break down complex problems until I find the solution. My goal is to study at Harvard and work with people from different cultures, because the strongest ideas come from diverse perspectives. I teach what I learn. Every time I explain something, I understand it deeper. I believe digital security isn't a luxury—technology must be secure from day one, not after problems emerge. I'm not just looking for a career—I'm looking for real impact. I want to build systems that protect people and inspire a new generation to ask: How does this work? How can we make it better? If you have a project, an idea, or even a question—reach out. 👨‍⚕️🧠💻🛡️

✋ ATTENDANCE POLICY

You will be withdrawn from the series if you have more than 2 unexcused absences in a row. Please message the tutor in advance for any absences!

You will be withdrawn from the series if you miss any session without giving the tutor prior notice.

You are free to attend/skip whichever sessions you want.

SESSION 1

20

Nov

SESSION 1

Other Topics

Other Topics

Thu 10:00 PM - 11:00 PM UTCNov 20, 10:00 PM - 11:00 PM UTC

Session 1: "Setting Up Your Security Lab"

First things first—you need a place to practice safely and legally.

This session, we're building your cybersecurity lab from scratch. You'll install VirtualBox, set up Kali Linux, create a Windows test machine, and configure them to work together. By the end, you'll have a complete isolated environment where you can break things without consequences.

We'll also walk through the tools we'll be using throughout Level 1, so you know what's in your toolkit. No theory lectures—just setup, configuration, and getting your hands dirty.

If you can follow step-by-step instructions, you'll leave this session with a working lab. That's the goal.
SESSION 2

27

Nov

SESSION 2

Other Topics

Other Topics

Thu 10:00 PM - 11:00 PM UTCNov 27, 10:00 PM - 11:00 PM UTC

Session 2: "Linux Command Line Survival"

Kali Linux is your main tool. But if you don't know how to use the terminal, it's useless.

This session covers the essential Linux commands every security professional needs. File navigation, permissions, users, processes, and basic bash scripting. Nothing fancy—just the stuff you'll actually use.

We're not memorizing commands. We're using them. You'll navigate the file system, modify permissions, create scripts, and get comfortable in the terminal. By the end, the command line won't feel foreign anymore.

This isn't a complete Linux course—it's the 20% of Linux knowledge you'll use 80% of the time in security work.
SESSION 3

4

Dec

SESSION 3

Other Topics

Other Topics

Thu 10:00 PM - 11:00 PM UTCDec 4, 10:00 PM - 11:00 PM UTC

Session 3: "How Networks Actually Work"

You can't secure what you don't understand. And most cyberattacks happen over networks.

This session breaks down networking fundamentals: IP addresses, TCP/IP, ports, protocols, and how data moves across the internet. But we're not just talking about it—we're watching it happen.

You'll use Wireshark to capture and analyze real network traffic. You'll see TCP handshakes, HTTP requests, DNS queries—all the invisible communication happening on your network. We'll also cover subnets, routing basics, and the OSI model (briefly, because you need to know it exists).

Theory when necessary, observation and analysis the rest of the time.
SESSION 4

11

Dec

SESSION 4

Other Topics

Other Topics

Thu 10:00 PM - 11:00 PM UTCDec 11, 10:00 PM - 11:00 PM UTC

Session 4: "Reconnaissance: Your First Scan"

Every security assessment starts with reconnaissance. What's out there? What ports are open? What services are running?

This session introduces Nmap, the most widely-used network scanning tool in cybersecurity. You'll learn how to scan networks, identify live hosts, detect open ports, and enumerate services and versions.

We'll start with basic scans and progress to more advanced techniques. You'll scan your own lab network, interpret the results, and understand what they mean from both an attacker's and defender's perspective.

This is your first real "hack"—legally gathering information about a target system. It's also where things start getting interesting.
SESSION 5

18

Dec

SESSION 5

Other Topics

Other Topics

Thu 10:00 PM - 11:00 PM UTCDec 18, 10:00 PM - 11:00 PM UTC

Session 5: "Web Applications from the Inside"

Most modern attacks target web applications. To exploit them, you need to understand how they work.

This session covers web application architecture: client-server model, HTTP methods, requests and responses, cookies, sessions, and how browsers communicate with servers. Then we'll set up a local web server and start analyzing it.

You'll use browser developer tools to inspect traffic, modify requests, and see exactly what's being sent and received. We'll look at HTML, observe JavaScript execution, and understand how data flows through a web application.

No coding required—just observation and understanding. By the end, websites won't be black boxes anymore.
SESSION 6

25

Dec

SESSION 6

Other Topics

Other Topics

Thu 10:00 PM - 11:00 PM UTCDec 25, 10:00 PM - 11:00 PM UTC

Session 6: "Password Security and Cracking"

Weak passwords are still one of the easiest ways into systems. So let's break some.

This session covers how passwords are stored (hashing, salting), how they're attacked (brute force, dictionary, rainbow tables), and how to crack them ethically in your lab.

You'll use John the Ripper and Hashcat to crack password hashes. We'll start with weak passwords and progress to stronger ones, so you can see the difference security practices make. You'll also learn to identify hash types and understand why password complexity actually matters.

Theory: 15 minutes. Cracking passwords in your lab: the rest of the session.
SESSION 7

1

Jan

SESSION 7

Other Topics

Other Topics

Thu 10:00 PM - 11:00 PM UTCJan 1, 10:00 PM - 11:00 PM UTC

Session 7: "Social Engineering: Hacking the Human"

The weakest link in security isn't technology—it's people.

This session explores social engineering: phishing, pretexting, baiting, and other psychological manipulation techniques attackers use. But we're not just discussing theory—we'll simulate attacks in controlled environments.

You'll create a phishing page (in your lab), craft convincing pretexts, and practice OSINT (Open Source Intelligence) by researching publicly available information about yourself. Then we'll discuss how organizations defend against these attacks.

The goal isn't to make you a social engineer—it's to help you recognize these techniques and understand the human side of cybersecurity.
SESSION 8

8

Jan

SESSION 8

Other Topics

Other Topics

Thu 10:00 PM - 11:00 PM UTCJan 8, 10:00 PM - 11:00 PM UTC

Session 8: "Cryptography Essentials"

Cryptography protects data at rest and in transit. You need to understand what it is, how it works, and when it fails.

This session covers encryption basics: symmetric vs asymmetric, hashing, digital signatures, and SSL/TLS. We keep the math minimal—just enough to understand the concepts.

Then we get practical: encrypt and decrypt files, analyze SSL certificates, identify weak encryption, and understand what "secure communication" actually means. You'll also see examples of broken cryptography and what happens when it's implemented incorrectly.

Not a cryptography course—just what you need to know as a security professional.
SESSION 9

15

Jan

SESSION 9

Other Topics

Other Topics

Thu 10:00 PM - 11:30 PM UTCJan 15, 10:00 PM - 11:30 PM UTC

Session 9: "Traning - part 1"

Time to put it all together.

Training on TryHackMe and Hack The Box
SESSION 10

22

Jan

SESSION 10

Other Topics

Other Topics

Thu 10:00 PM - 11:30 PM UTCJan 22, 10:00 PM - 11:30 PM UTC

Session 10: "Training- Part 2"

Training on TryHackMe and Hack The Box

Public Discussion

Please log in to see discussion on this series.

Nov 20 - Jan 22

10 weeks

60 - 90 mins

/ session

Next session on November 20, 2025

SCHEDULE

Thursdays

10:00PM