Focus Program
Intro to Ethical Hacking
Ethical Hacking
Hacking
Kali Linux
Nmap
Intermediate
$306
$360
4/21/26 to
6/9/26
Ages 12+
Overview
In the Introduction to Ethical Hacking Focus Program, students step into the shoes of a hacker—not to cause harm, but to learn how to defend against cyber threats in a safe, controlled environment. Over 8 weeks, they’ll experience the five phases of a penetration test: Reconnaissance, Scanning & Enumeration, Gaining Access, Maintaining Access, and Covering Tracks. Each phase introduces real-world techniques used by security professionals, known as Penetration Testers, with every lesson tied directly to a hands-on lab.
Students work inside a secure, lab environment built just for Coder’s Clubhouse students. They’ll scan networks with nmap
, brute force weak passwords with hydra
, exploit misconfigured FTP or MySQL services, and even learn how hackers cover their tracks by editing log files. But just as importantly, they’ll explore ethics—understanding the difference between white-hat, grey-hat, and black-hat hackers, and why responsibility is the cornerstone of cybersecurity.
This class isn’t just about hacking commands—it’s about building confidence, critical thinking, and future-ready skills. Parents love it because students get a first taste of one of the fastest-growing career fields, while kids love it because they feel like “real hackers” exploring secret backdoors and vulnerabilities—safely and under the guidance of expert instructors.
By the end, students will complete a full, step-by-step ethical hacking exercise, showcasing how to think like an attacker and defend like a pro.
Who It's For
Recommended for ages 12–18. Students should be comfortable with basic computer use and ideally have some prior coding experience (Scratch, HTML, or beginner Python). All participants must sign the Coder’s Clubhouse Ethics & Safety agreement and will work only in a secure lab environment.
Key Concepts
The Five Phases of a Penetration Test
Cybersecurity ethics and hacker “hats” (white, grey, black)
Linux basics and command-line navigation
Reconnaissance with
curl
andnmap
Scanning & enumeration of common services (FTP, SMB, HTTP, SSH, MySQL)
Exploiting weak credentials and default logins
Tools of the trade: Hydra, Netcat, MySQL clients
Maintaining access with backdoors
Covering tracks by editing system logs
Soft Skills
Ethical decision-making in technology
Problem-solving under pressure
Team collaboration during labs
Attention to detail in technical tasks
Confidence with new tools and systems
Communication of findings in clear, simple terms
Outcomes
Understand how hackers think and why defenders must stay one step ahead.
Master the five phases of a penetration test in a guided lab setting.
Gain hands-on practice with real tools (
nmap
,hydra
,ftp
,ssh
,netcat
).Identify and exploit weak system configurations safely.
Learn the importance of ethics and responsibility in cybersecurity.
Build a foundation for advanced courses, certifications, or future careers in cybersecurity.
Present a final wrap-up exercise that demonstrates the full penetration testing process from reconnaissance to covering tracks.

Focus Overview
Other Focus Program Classes
Want to explore more? Check out these other Focus Program classes!
Sign up for our newsletter!
📅 Stay on Top of Upcoming Focus Classes
Browse upcoming Focus sessions and add them to your own Google Calendar. Subscribe to stay updated and keep your child’s schedule organized with ease
**Charged today for first month. Billing resumes at opening at $229/mo.