All specialisations
Specialisation · 11/11

Cyber Security

Think like an attacker — build like a guardian.

Levels

2

Middle · Senior

Outcomes

5

Skills children walk away with

Pathways

4

Future careers unlocked

Defenders in training.

The idea

Every student who uses the internet operates within a threat environment. Cyber security at NASCA builds both the personal resilience to navigate that environment and the professional foundation to build systems that resist attack. Students develop the defender's mindset — understanding how systems fail in order to design systems that do not. The curriculum progresses from digital safety fundamentals and cryptography in Grade 7 through network security, web vulnerabilities and Linux-based tooling in the middle years, to full penetration testing methodology, CTF competition and professional-format security reporting at senior level.

Inside the stream — a story

Think like an attacker — build like a guardian.

Children grow up online. Teaching them to think like a defender — and understand how attackers think — is one of the most practical, life-long skills a school can give. It also opens a fast-growing global career path.

Strong passwords, set up live.

We do not lecture. We sit down with each child and a password manager. We turn on two-factor authentication on their real accounts. We role-play phishing emails until they can spot them in their sleep.

Within a week, our students are the safest people in their families online.

Within a week, they're the safest people online in their family.

Famous breaches, in plain language.

We walk children through real incidents — what happened, how, and what should have stopped it. They learn that most breaches are not glamorous. They are boring. Tiny mistakes, repeated, at scale.

It is a powerful inoculation against complacency.

Why ‘rolling your own’ is a bad idea.

Children build a tiny encryption tool from scratch — and then watch us crack it on stage. The lesson lands instantly: cryptography is hard, libraries exist, and humility is a security feature.

From then on, they reach for proven tools instead of clever tricks.

Inspecting traffic, spotting the strange.

We open Wireshark in a sandboxed lab. Children watch packets fly past and slowly learn to spot the ones that don't belong. They run a tabletop incident — playing attacker, defender, communicator and PR all at once.

It is the most fun our students have all year. It is also the most serious.

School-wide Capture-the-Flag.

Older students design and run a CTF for the whole school. There are tracks for web, crypto and forensics. Younger students compete in mentored teams. The winners get medals. Everyone learns.

We have watched a generation of cybersecurity professionals begin in this very tournament.

We have watched a generation of professionals begin in this tournament.

A scene from a real classroom

A 13-year-old gently helps his grandmother set up two-factor authentication on her bank login over a Sunday afternoon. He does not patronise. He does not rush. He explains. She has never been safer.

Cybersecurity, taught well, makes children calmer online — and makes the rest of us safer too. It may be the most practical course your child will take.

— End of story · Read on for the curriculum

The journey

A four-stage arc

01

Hygiene

Master passwords, 2FA and the basics that stop 90% of attacks.

02

Attack

Learn how attackers think — safely, in a sandbox.

03

Defend

Detect and block what you’ve learned to attack.

04

Compete

Run a school-wide CTF as the final showcase.

Signature project

Flagship build

School-wide CTF

An end-of-term capture-the-flag tournament — students hunt flags across web, crypto and forensic challenges.

Why it matters

Children grow up online. Teaching them to think like a defender — and understand how attackers think — is one of the most practical, life-long skills a school can give. It also opens a fast-growing global career path.

A typical session

  1. 01Open with a real recent breach
  2. 02Discuss what went wrong
  3. 03Hands-on lab in a sandbox
  4. 04Defender drill — detect and respond
  5. 05Reflect on personal digital habits

The curriculum

What they actually learn

Six modules across an academic year. Every module is hands-on, project-led and ends with something children have built and can show.

M01Weeks 1–3

Personal hygiene

  • Strong passwords and password managers
  • Two-factor authentication — set it up live
  • Spot phishing and social engineering
  • Lock down your own accounts as homework
M02Weeks 4–6

How systems break

  • Common vulnerabilities, in plain language
  • Threat modelling for a small system
  • Walk through famous breaches
  • Hands-on demo in a safe sandbox
M03Weeks 7–9

Cryptography basics

  • Symmetric vs asymmetric encryption
  • Hashing and salting passwords
  • Build a tiny encryption tool
  • Why ‘rolling your own crypto’ is dangerous
M04Weeks 10–12

Networks and traffic

  • How packets actually travel
  • Inspect traffic with Wireshark
  • Spot suspicious patterns
  • Build a mental model of the internet
M05Weeks 13–15

Defend and detect

  • Logging, alerts and incident response
  • Run a tabletop incident exercise
  • Set up basic defences on a test box
  • Document what you did and why
M06Weeks 16–18

Capstone: School-wide CTF

  • Design and run a capture-the-flag event
  • Tracks for web, crypto and forensics
  • Mentor younger students through it
  • Reflect and write a security report

Showcase moments

Three highlights through the year

  1. Term 1

    Lockdown Week

    A school-wide drive where students help families secure their accounts.

  2. Term 2

    Tabletop Incident

    A simulated breach where students play attacker, defender and responder.

  3. Term 3

    School CTF

    The flagship inter-class capture-the-flag tournament.

For parents

Within weeks your child will be teaching the family about 2FA, password hygiene and phishing. The household gets safer — that alone is worth it.

For teachers & schools

All offensive content runs in a vetted sandbox; nothing targets real systems. Comes with a safety policy template for schools.

What children build

  • Cryptography labs
  • Network security exercises
  • Web vulnerability hunts
  • CTF competitions
  • Professional security reports

Tools & tech

Linux CLIWiresharkBurp SuiteTryHackMeCTF platforms

Levels offered

MiddleSenior

Outcomes

What they walk away with

01

Threat modelling

02

Cryptographic basics

03

Network awareness

04

Safe-online habits

05

Defender mindset

Questions parents ask

FAQ

The honest answers to the questions families ask us most.

Are children taught to ‘hack’?

Only in legal, sandboxed environments — to learn defence. We make the ethics explicit from day one.

Is this safe for the school network?

Yes. All exercises happen in isolated environments approved by school IT.

Does it lead to a real career?

Cybersecurity is one of the fastest-growing global careers, with severe talent shortages.

What age is appropriate?

Personal hygiene from Middle School; offensive/defensive labs from Senior onwards.