Designed for students aged 12-20, Hacker Highschool comprises a comprehensive curriculum that introduces students to critical concepts in cybersecurity. Available for purchase by individuals, instructors or entire school systems, Hacker Highschooll puts students on a pathway to earn industry-recognized certifications and prepares them for a career in this fulfilling and lucrative field.
Hacker Highschool introduces teens and young adults to the field of cybersecurity through a combination of engaging lessons, stories, articles, video games and practical exercises. As students progress through the courses, they will master the ability to deal with cyber issues like security, privacy, bullying, misinformation and fraud while learning how to research and communicate like a professional.
Students will also prepare to earn industry-recognized certifications like Certified Junior Hacker and Certified Hacker Analyst, proving that they have the foundation necessary to succeed in a range of entry-level cybersecurity positions.
Employment of information security analysts is projected to grow 33 percent from 2023 to 2033. (U.S. Bureau of Labor Statistics, 2024)
2.7M
In Demand
The global shortage of cybersecurity professionals at the end of 2021 is 2.7 million. Companies around the world are looking to fill these highly sought out positions. (ISC2)
$131,000
Well-Compensated
National average pay for cybersecurity professionals (U.S. Bureau of Labor Statistics, 2022).
For Classrooms
Bring Hacker Highschool to your classroom
Partnering with Hacker Highschool ensures that you have everything you need to provide a high-quality cyber curriculum to your students in an easy, fun, accessible and exciting course. No previous cybersecurity skills or knowledge are required to teach these lessons, and no presentation material or additional books are required.
The courses come in four levels — each relating to a level of the United States' school system from grade 9 to grade 12. Institutions or instructors can purchase access for a certain number of seats and proctor the course for a class of students synchronously. Hacker Highschool provides comprehensive resources to support the curriculum and guide instructors toward successful delivery.
Instructors have a number of options to deliver the course material:
Integrate Hacker Highschool with your school’s own Canvas or Blackboard environment.
Integrate Hacker Highschool with another Learning Management System (LMS).
Leverage the Quinnipiac University LMS for Hacker Highschool. This solution is available worldwide for any schools without a dedicated LMS
Pricing based on class size and subscription duration. For more information, contact LifelongLearning@qu.edu.
For Individuals
Learn cybersecurity at your own pace
Learn to become a resourceful, creative and ethical hacker at your own pace! By registering for a single level of Hacker Highschool, you can improve your ability to solve cyber problems, learn from your mistakes and break into a competitive field on a strong foundation of internationally-recognized cybersecurity methodologies.
Hacker Highschool courses start out extremely practical, with exercises in things relevant to you like checking out privacy leaks in social media apps and determining if an email is fraudulent. As you become a cyber superstar, the material gets progressively more complex until you can test and secure networks, hunt down anonymous phishing scammers, detonate malware, detect wireless leaks and prompt-hack an AI bot.
Students who participate in self-study will access course materials through the Quinnipiac University LMS. You will have six months to make it through each level, with final exams conducted by a local proctor or via webcam.
Levels of Hacker Highschool
There are four levels of Hacker Highschool: Levels 9-12. Each level is a self-contained course consisting of a self-guided path through books, articles, videos, research support, learning games, hands-on cyber range practice, exercises, homework and grading for a full, school course year.
First year Hacker Highschool students will learn to control computers through the command line, understand the intricacies of the security behind networking, system services, Internet services and the various operating systems.
You'll learn:
How to research and fact-check any topic effectively
Developing critical thinking and research skills
Using Google dorking and AI to support your research
How to create a strong password and store it safely; Multi-Factor Authentication
Is it safe to download free games or applications?
How to check if an app is legitimate; security measures in app stores
Why do apps require constant updates?
The evolution of online payments
Understanding the trade-offs between convenience and privacy when using online platforms
How to recognize and react to scams
Sharing pictures and personal information on the Internet
Basics of Internet privacy; Internet cookies
How to recognize and respond to cyberbullying behavior
Mobile threats
How to quickly determine if a link is safe and if a website is a scam
Introduction to Linux and the CLI
Basics of networking
WiFi and Bluetooth security; using public WiFi securely
Game cheats and piracy; are game cheats safe to download?
Can pirate sources be trusted?
Basics of the OSSTMM
4PP Analysis – Four Point Process to Analyze how anything works
Second year Hacker Highschool students will learn to defend themselves through security analysis techniques with attack analysis, malware analysis, traffic analysis, system forensics and counter forensics.
You'll learn:
What is biometric authentication and the ethical issues associated with it?
Can biometrics be stolen?
How to conduct advanced research and document it properly
Markdown language for reporting
How to track down the author of an online post
How to not get doxxed
What is social engineering?
Basic types of networks and network devices and how they work
How to perform a thorough analysis of a URL
How to securely investigate a phishing message
How web browsing works
How to view and search for hidden onion websites
How Internet users are tracked and how to prevent it
Encryption and how to communicate securely
The impact of tech giants on digital privacy
Time management and its benefits
How to balance screen time and real-world activities for mental wellbeing
Malicious uses and risks of AI
Basic file management, networking commands and scans with the command line
How to make your computer more secure (hardening)
How a computer system is built and how to obtain detailed information about it
How network services work
How email works and how to secure it
Basics of Windows scripting
What are the common web vulnerabilities and zero-days?
The OSSTMM and Controls
Basics of HTML and CSS
Basics of Python
Third year Hacker Highschool students will learn what it means to be a Hacker and learn proper problem solving, security analysis, and researching techniques. The main focus will be on the security of email, web technology, password technology, privacy and encryption.
You'll learn:
Advanced research: data leaks, leaked databases; password and credential hunting
TOR network, onion browsing and darknet forums
E2E encryption; setting up anonymous means of contact
AI and LLMS; data modelling
How Blockchain technology, Web3 technologies and NFTs work
Email threats and prevention
Remote protocols: FTP, SSH, telnet; SSH for secure connections
Basic network troubleshooting
How to analyze the traffic in your home network or any network
Types of network protocols
Command line text editors
Basics of Powershell
Types of malware; malware case study
Malware delivery techniques and detection methods
Malware countermeasures
Threat Hunting
Basics of forensics - pictures, phones, meta data
Data recovery and permanent data deletion
Password physics and how to crack a password
Cyber security and critical infrastructure
How to tell you're under an attack
State-level cyber attacks
The OSSTMM - Limitations
The OSSTMM – Interactions
Fourth year Hacker Highschool students will be focusing on examining the vulnerabilities in systems, hardening systems like Windows 10 and Linux, and learn basic operations in to compete in CTFs and work as a Junior SOC Analyst.
You'll learn:
The OSSTMM: Trust Analysis
HTTP and HTTPS protocol
Secure web applications; web app hardening
Network hardening
Windows hardening
Filesystem and the registry
Vulnerability scanners
Advanced encryption; quantum computing and cryptography
Modern password cracking: hashes, wordlists, dictionaries, salts
Vulnerability databases, bug bounty programs
Computer forensics
Cyber incident case studies
Malware analysis
Wireshark and advanced network forensics
Network scanning and packet-crafting
Types of attacks, attack vectors and attack analysis
Web technologies and common web attacks
NIST and other security standards
OSSTMM: How to define the scope for a pen test
OSSTMM: How to analyze interactions
OSSTMM: How to analyze anything for weakness
OSSTMM: Writing security reports
Defensive Hacking - SOC
Securing AI
Student Spotlight
Hacker High School leads Bobcat to cyber success
June 3, 2024
Nicky Desai ’28, solidified her passion for coding and innovation in Quinnipiac’s Hacker High School program. During her senior year of high school, Desai realized that Quinnipiac would become her new academic home, providing a foundation for her to hone her skills and pave the way for forward-thinking innovators like herself.
Quinnipiac University has been designated as a Center of Academic Excellence in Cyber Defense by the National Centers of Academic Excellence in Cybersecurity. This designation recognizes that our program serves the nation well, contributes to the protection of the national information infrastructure and addresses the critical shortage of professionals with cybersecurity skills.
Additionally, the National Security Agency and a committee of academic peers have validated Quinnipiac University's Master of Science in Cybersecurity programs through the 2027 academic year. Per the 2018 National Cyber Strategy, "A highly skilled cybersecurity workforce is a strategic national security advantage."