Summer 2026 ยท Gifted Gabber

Cybersecurity Program
for High School Students

8 live sessions with a Villanova University professor. Build real cybersecurity skills. Create an original project. Walk away with a standout STEM credential โ€” for $1,000.

Potential Areas of Research
Software Security Network Security Cryptography Post-Quantum Cryptography Binary Exploits & Reverse Engineering Intrusion Detection Blockchain Security Cybersecurity Project
Book a Free Call Now! โ†’ Free ยท No commitment ยท 30 minutes
June 21 โ€“ August 9, 2026 (TBD)  ยท  Sundays 9:00 PM EST  ยท  Limited Seats
8
Live Sessions
$1,000
Program Cost
Sunday
9:00 PM EST
๐Ÿ”
Cybersecurity Project
Upsell
Research Paper Option
Is this right for you?
This program is for you ifโ€ฆ

Your student checks at least one of these boxes:

โœ“
They're aiming for top CS, engineering, or cybersecurity programs โ€” and want real, hands-on experience to strengthen their application.
โœ“
They're fascinated by how hackers think, how cryptography works, or how networks are secured โ€” and want to go beyond classroom theory.
โœ“
They want to build something real โ€” an original cybersecurity project โ€” guided by a Villanova University professor with expertise in blockchain security, IoT, and cryptography.
โœ“
They want a standout STEM credential at an accessible price โ€” with the option to add a published research paper if they want to go further.

"Most students list 'interested in cybersecurity' on their applications. Very few have actually built something โ€” and had a Villanova professor sign off on it."

What students achieve
Here's exactly what your child walks away with

8 weeks of expert-led sessions โ€” from foundational concepts through post-quantum cryptography โ€” culminating in an original project and a professional faculty reference.

๐Ÿ”
Original Cybersecurity Project
A completed, reviewed, and approved original project โ€” professionally documented and signed off by the Villanova professor.
๐ŸŽค
Oral Project Defense
Students present and defend their project before a faculty panel โ€” just like real graduate researchers.
๐ŸŽ“
Faculty Reference
A professional reference from the Villanova University professor โ€” credible, verifiable, and ready for college applications.
๐Ÿ†
Standout STEM Credential
An original project with a Villanova faculty reference is a rare, immediately verifiable differentiator for CS and engineering applicants.

Curriculum
8 sessions โ€” foundations to post-quantum

Every session builds directly on the last. By Session 8 students have covered the full cybersecurity landscape and are ready to apply it in their original project.

1
Introduction to Cybersecurity
CIA Triad ยท Threats & Attacks ยท Security Principles
Defining security and the CIA Triad: Confidentiality, Integrity, Availability.
Threats and attacks โ€” Alteration, Denial-of-Service, Masquerading โ€” how they work and how they're prevented.
Core security principles and tools that underpin every area of cybersecurity.
2
Understanding Computer Systems
CPU ยท OS ยท Networking Components ยท LAN/WAN
Computer components: CPU, memory, storage, OS โ€” the foundation for understanding how attacks target systems.
LAN/WAN organization; connectivity types โ€” Wi-Fi, Ethernet, fiber-optics.
Networking components: switches, routers, mobile devices โ€” and their roles in a secure or insecure network.
3
Software Security: Basics
Malware ยท Insider Threats ยท Vulnerability Scanners
Malware taxonomy: worms, trojans, viruses, spyware, ransomware, phishing โ€” how each works and how to detect them.
Insider and employee threats โ€” often the most overlooked attack vector in real organizations.
Vulnerability scanners: Nessus and OpenVAS โ€” industry-standard tools used by real security professionals.
4
Software Security: Binary Exploits & Reverse Engineering
Low-Level Systems ยท Vulnerability Classes ยท Exploit Mechanisms
Low-level system operation โ€” understanding how software runs at the machine level, and why that matters for security.
Reverse engineering fundamentals โ€” techniques used by both attackers and defenders to analyze software without source code.
Vulnerability classes, analysis, and exploit mechanisms โ€” the real mechanics of how software gets compromised.
5
Network Security
OSI Layers ยท TCP/IP ยท Firewalls ยท Intrusion Detection
OSI Layer Abstraction and network protocols overview โ€” the architecture that underpins all networked communication.
TCP/IP: vulnerabilities, attacks (SYN floods, spoofing, MITM), and countermeasures.
DNS security, firewall types and configuration, and Intrusion Detection Systems (IDS).
6
Cryptography: Symmetric Encryption
Historic Ciphers ยท Cryptanalysis ยท Secret Key Cryptography
Introduction to cryptography: classification, setup, notation, and historic ciphers.
Cryptanalysis attacks โ€” how encryption is broken and what makes an encryption scheme strong.
Symmetric encryption, secret key cryptography, and stream ciphers.
7
Cryptography: Asymmetric Encryption
Public-Key Infrastructure ยท MAC ยท Real-World Applications
Asymmetric encryption โ€” how public and private keys enable secure communication between strangers.
Message Authentication Codes (MAC) and digital signatures โ€” verifying authenticity and integrity.
Public-key infrastructure and real-world applications โ€” the systems securing HTTPS, email, and online banking.
8
Post-Quantum Cryptography
Quantum Threats ยท Modular Arithmetic ยท Future of Secure Communications
Mathematical foundations โ€” modular arithmetic and the problems that classical cryptography is built on.
Why quantum computers threaten classical encryption โ€” and which systems are most at risk.
Post-quantum cryptographic primitives and the emerging standards being developed to secure the future.

Want to go further?
Research Paper โ€” Optional Upsell
๐Ÿ”ฌ Add-On Available

Turn Your Project Into a Published Research Paper

Students who want to take their cybersecurity project to the next level can add the full Research Paper track as an optional upgrade โ€” turning a strong project into a published, peer-reviewed paper with a faculty Letter of Recommendation.

5 Technical Writing & Publication Sessions with the Lead Creative Writer
Full 4,000+ word publication-ready cybersecurity research paper
Stamp of Quality โ€” professional writing review and approval process
Faculty Letter of Recommendation โ€” automatically triggered by the Stamp of Quality
Guided journal submission and conference abstract support
Who teaches this
Meet the faculty
VU
Research Mentor โ€” Assistant Teaching Professor, Cybersecurity
Villanova University ยท PhD in Communication Engineering, IISc Bangalore ยท Postdoctoral Research, University of Padova (SPRITZ Security Group)
A cybersecurity specialist with a PhD from the Indian Institute of Science (IISc) Bangalore and postdoctoral research at the University of Padova's SPRITZ (Security and Privacy Through Zeal) group. Research focuses on designing and developing secure, privacy-aware protocols for distributed networks and systems. Expertise spans blockchain security, IoT network security, cloud computing security, ToR network security, physical layer security, and cryptography. Co-edited a book published by Taylor & Francis and serves as Guest Editor for Springer and Taylor & Francis journals.
Blockchain SecurityIoT SecurityCloud SecurityCryptographyNetwork Security

โฑ Why you need to act now

Spots are strictly limited. Students who enroll early secure their place with the professor โ€” and have the option to add the research paper upsell before it fills.

June 21Program starts (TBD)
Aug 9Program ends (TBD)
$1,000Core program
LimitedSeats only
Book a Free Call Now! โ†’
Common questions
Frequently asked questions
Do students need prior cybersecurity or coding experience?
No. The curriculum is structured to build from the ground up โ€” starting with foundational concepts and progressing through the full cybersecurity landscape by Session 8. Curiosity is all that's required.
What kind of project will students build?
Projects are tailored to the student's chosen area of interest โ€” from network security tools and cryptographic implementations to vulnerability analysis and blockchain applications. The professor helps each student identify the right scope.
How is the Research Paper Upsell different from the core program?
The core program ($1,000) covers the 8 sessions and the cybersecurity project. The upsell adds 5 writing sessions with a Creative Writing Expert, producing a 4,000+ word research paper โ€” plus the Stamp of Quality process, a faculty Letter of Recommendation, and guided journal submission. Ask about upsell pricing on your free call.
How does this help my child's college application?
An original cybersecurity project reviewed and defended before a Villanova University professor is one of the most distinctive STEM credentials a high school student can hold. Add the research paper upsell and it becomes even stronger โ€” a published paper plus a faculty LOR.
Are sessions group or individual?
The 8 core sessions are group format on Sundays at 9:00 PM EST. Students in the Research Paper Upsell also receive individual 1-on-1 writing sessions with the Creative Writing Expert.
Is there support between sessions?
Yes. WhatsApp group for parents, Discord for students, and Program Coordinators and Coach Jo available anytime via WhatsApp, Discord, email, or phone.