top of page

Getting Started in Cybersecurity: Charlie Frick

May 30


Charlie Frick started working at the John Hopkins University Applied Physics Laboratory in 2003 but switched to cyber security in 2009. He supported the Mid-Atlantic Cyber Defense Competition, and starting in 2014, he led High School Cyber Security Workshop. Delving into the topic more, Charlie shows how in cyber security, it is important to know both how to defend a network and know how it can be attacked. It is also crucial to note that hacking is not a crime, but it is illegal to use ethical hacking on a system that you do not own or have expressed permission for. Cyber security is a field that both lacks people in and is good to learn about though. To start in cyber security, he suggests that students learn more about computer programming and networking and take interests in cybersecurity via different forms of media. There are also many free resources available online to build a virtual machine so they never have to risk running into any legal problems. For the second half of the presentation, Charlie shows us a demonstration of what a cyber security attack actually looks like. Nearing the end of the presentation, he also provides a multitude of resources to learn about and participate in cyber security with an emphasis on obeying ethical and legal considerations. Charlie also briefly mentions that there are cyber security scholarships available as a little bit of motivation. He finishes the presentation with a summary of his own and a reminder to never experiment on a computer without permission.

Key Questions

What is cyber security, and what are the caveats involved in it?

What can high school students do to start a career in cyber security?

What tools and resources are available to start being involved in cyber security?

What do cyber security attacks really look like?

Find what you’re looking for

00:26 - Introduction

01:10 - Start of the field trip

02:27 - About the presenter

04:46 - Hacking and warnings about it

08:24 - Why do we care about cyber security?

10:36 - Real life example

12:24 - What can you do about it?

15:09 - Tools for learning cybersecurity

17:16 - Demonstration

27:35 - Online training

28:36 - Sans CyberStart

29:08 - Cyberpatriot

30:03 - A general note about college funding

30:53 - Cyber scholarships

32:44 - Summary

33:59 - Closing by Project Exchange


High School Cyber Security Workshop -

Twitter cyber security accounts to follow - Rob Fuller (@mubix) · Twitter , Ian Coldwater ⎈ (@IanColdwater) · Twitter , Maddie Stone (@maddiestone) | Twitter , Lesley Carhart (@hacks4pancakes) · Twitter , strandjs (@strandjs) | Twitter , Georgia Weidman (@georgiaweidman) · Twitter , Paul Asadoorian (@securityweekly) · Twitter , Johnny Long (@ihackstuff) | Twitter , briankrebs (@briankrebs) · Twitter , CrowdStrike (@CrowdStrike) · Twitter , A. Hacker (@armitagehacker) · Twitter

Free tools to help understand cybersecurity - Oracle VM VirtualBox , Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution , Metasploit | Penetration Testing Software, Pen Testing Security ... , Armitage - Cyber Attack Management for

Cyber security definition - What Is Cybersecurity? - Cisco › Products & Services › Security

Online training resources - Hacker Highschool - Security Awareness for , MITRE Cyber Academy | Welcome , SEED Labs - Syracuse

SANS CyberStart - CyberStart - SANS Institute

CyberPatriot - AFA CyberPatriot Website

College Scholarships - Cybersecurity Talent Initiative , CyberCorps®: Scholarship for Service , STEM Major Scholarships for Undergraduate Students | AFCEA ...

bottom of page