You use the web every day — at least, you’re using it right now — but how much do you really know about how how it works? Do you know how hackers operate, and how to secure your web browsing? In this course, students will pick up knowledge on computer & network security in real-world situations, through engaging activities such as networking role-play, code-breaking, and encrypting data in images.

This course fulfils the requirements of Ethical Hacker Jr (Intermediate) on IDA’s ICT Learning Roadmap. There are no pre-requisites for this course.


By the end of the course, students should be able to:

  • Understand the structure of the Internet and its implementation (IP addresses, DNS, DHCP)
  • Set up a home network, and demonstrate ways to protect the network from unauthorised access
  • Research a simple encryption algorithm, and be able to encrypt & decrypt a transmitted message using the Python programming language
  • Understand security concerns such as man-in-the-middle attacks, password choices, 2-factor authentication


  • Laptops preferred over desktops. Should run Linux, or be allowed to dual-boot into Ubuntu (e.g. a Live CD), or be allowed SSH access to an external server (hosting provided)
  • For Windows machines, PuTTY for SSH
  • We will provide routers for use during the course; ideally, they should be allowed to connect to the school network
  • We can work with the school’s technical team to set up an optimal operating environment

Course length

36 hours (12 × 3-hour sessions)


None. Suitable for upper secondary and above


  • For Infocomm Clubs in MOE schools, please visit IDA's ICT Learning Roadmap page to find out more about potential funding for this course, or email for more information.
  • For other schools, please enquire for rates.
  • No paid software required, but the school should provide laptops for student use.

Infocomm Club Course Code


Course outline

  • Structure of the Internet, and networking equipment
  • How to discourage wi-fi freeloading
  • Name resolution
  • Hosting Internet services
  • Encryption: substitution cyphers, transpositional cyphers, breaking cyphers with frequency analysis, secret-key cryptography, symmetric ciphers, public-key cryptography
  • Hashes & signing (GPG)
  • Man-in-the-middle attacks
  • HTTPS and SSL
  • Password security, how hackers steal passwords
View full course outline on Google Docs