top of page
hacker.jpg

Ethical hacking

What am I getting myself into?

When you conjure up an image of a "hacker" in your mind, do you see the image on this page? A guy with a hoodie, hunched over a computer, typing rapidly in a dark room? Well, some portions of that assumption are right--actually only the computer part.

 

We’re all girls and don’t use a computer in a dark room: it’s bad for your eyes.

 

Anyways, ethical hacking, or “white hat” hacking, is on the defensive side. We try to find the vulnerabilities in systems before the bad guys do. 

 

Example: Let’s say there’s a wall built to keep enemies out. How do you know if it’s bulletproof or completely stable? That’s where we come in. Ethical hackers try to break down the wall to find vulnerabilities, or weak spots, before the bad hackers do. That way, we can fix it before they come and try to infiltrate our systems.

​

  • Ok… so what’s this club about?

 

When you join CyberCatamounts, you’ll be able to train yourself to think like a hacker. You’re trying to find ways that could cause something to be exploited. Basically, you’re finding loopholes that you can take advantage of. For more information on the specific skills or an answer to “Why is Cybersecurity important?”, click on the button below.

​

  • How are some random high school girls going to teach me how to ethically hack?

 

Don’t worry--we’re not inexperienced. In fact, (self-promotion) did we mention that our team placed 3rd nationally in the National Championship out of 276 other teams? In addition to GGCyberstart’s highly addictive Cyberstart Game, we’ll be providing weekly challenges, explanations, tutorials, and a school-wide CTF! 

 

Don’t know what a CTF is? Once again, check out “Intro to Cybersecurity,” which is linked below. And for you Percy Jackson fans: hopefully you know what we're talking about.

©2020 by CyberCatamounts. Proudly created with Wix.com

bottom of page