Section outline

    • girl fighting against AI with ninjutsu

    • Ninjutsu – Cybersecurity

      AI is supercharging scams, hacks, and deception — train your teen to fight back with real security skills.
      Ninjutsu wins through stealth, awareness, and control. Cybersecurity is modern ninjutsu: see the attack before it lands, shut the door before it opens, and disappear from easy targets.


      ✅ Start here (free)

      Start at Lesson 1 and move forward. Each lesson is broken into micro‑presentations (short, clear screens — one concept at a time). This makes training realistic even with school and distractions.

      1. Learn: read the micro‑presentations
      2. (Paid) Drill: take the quiz and record your score
      3. Prove: pass the belt exam to rank up

      Ninjutsu rule: stay invisible to easy attacks. Reduce exposure, build discipline, and don’t become a target.

      👨‍👩‍👧 For parents: why this course matters

      AI has scaled cyber threats: phishing, impersonation, password attacks, and automated scanning. This course trains teens to think like defenders: verify reality, recognize threats, reduce exposure, and build safer habits.

      The goal is not “cool hacking.” The goal is defensive discipline: awareness, prevention, safe decision-making, and understanding how attacks unfold so they can be stopped.

      Disclaimer: This course builds skills and discipline. It does not guarantee certifications, jobs, or outcomes.

      🎯 For teens: the mission

      Train like a defender in the shadows: spot traps, read systems, and lock them down. AI can generate confident “answers.” You’ll train what’s true, what’s risky, and what actually protects you.

      • Be hard to fool: resist scams, impersonation, and manipulation
      • Be hard to steal from: protect accounts, devices, and data
      • Be hard to track: reduce your public footprint
      • Earn belts: prove your skills under pressure

      If you like strategy and “seeing the trap before it happens,” send this course to a friend.

      🧠 What your teen will learn
      • Security goals and threat thinking (how breaches unfold)
      • Recon and footprint awareness (what’s exposed and why it matters)
      • Network and service exposure concepts (“doors and windows”)
      • Vulnerability scanning concepts and prioritization (defensive viewpoint)
      • Authentication failures and defensive countermeasures
      • Malware awareness and basic analysis thinking (safe, defender-oriented)
      • Traffic awareness and interception risks (defender view)
      • Social engineering defense habits
      • Web application security fundamentals (common weaknesses + fixes)
      • Wireless/mobile/IoT/cloud risk thinking and hardening essentials
      • Cryptography basics: encryption, hashing, keys, signatures
      🛡️ Ethics & safety rules (important)
      • Defensive course. This dojo trains protection, not harm.
      • No targeting real systems. Only learn on your own accounts/devices or authorized training environments.
      • Permission is the line. “I was curious” is not a defense.
      • Parent involvement encouraged for belt tests and accountability.

      Ninjutsu mindset: control yourself first. Then control your security.

      🥋 How training works (simple + structured)
      • Short training slides (micro‑presentations; one idea per screen)
      • (Paid) Auto‑graded drills/quizzes with retries
      • (Paid) Belt exams to prove progress
      • Moodle tracking: scores, completion, progress history
      • No technical DM support required — progress is designed to be independent

      Learn → drill → test → rank up. That’s the dojo system.

      🥋 Belt map

      Lesson ranges refer to the course training forms.

      • White Belt (Lessons 1–5) — Shadow Code Fundamentals
        Security goals, threat models, risk thinking, incident basics, ethics/laws/safe practice.
      • Yellow Belt (Lessons 6–10) — Leave No Footprints
        Public footprint, OSINT discipline, domain/DNS awareness, web presence clues, identity/email exposure.
      • Orange Belt (Lessons 11–13) — Map the Battlefield
        Network discovery concepts, ports/services as “doors,” and enumeration mindset.
      • Green Belt (Lessons 14–17) — Find Weak Points, Fix First
        Vulnerability scanning concepts, prioritization, authentication failures, post-compromise awareness.
      • Blue Belt (Lessons 18–21) — Read the Wire
        Malware indicators, analysis thinking, traffic awareness, interception/MITM concepts and counter-moves.
      • Brown Belt (Lessons 22–24) — Human Firewall
        Social engineering defense, DoS resilience mindset, session/token risks and countermeasures.
      • Black Belt (Lessons 25–30) — Master of Defense Systems
        Web + API defense concepts, wireless/mobile risks, IoT/OT risks, cloud + crypto essentials.
        Black Belt Test: comprehensive final exam.

      Belts are proof. Parents get visibility. Teens get momentum.

      🏷️ Free vs Dojo Membership (paid)

      Free (Guest Training)

      • Access the free lesson content (training slides / micro‑presentations)
      • See the curriculum + belt map
      • Preview the dojo structure

      Dojo Membership (Paid)

      • Full access to all drills, quizzes, and belt tests
      • Belt tracking and certificates
      • Parent visibility of progress and scores inside Moodle

      Founders / Inauguration Price: $5 per course for 30 days (about the price of a coffee). This is the launch price while the dojo is expanding — as more belts, exams, and courses are added, the price will rise.

      📚 Curriculum / Training Forms (30 lessons)
      1. The Ninja Code — what security protects and how defenders think.
      2. Threat Thinking — attack lifecycle models and defensive mapping.
      3. Risk Management — prioritize what matters.
      4. Incident Readiness — contain, eradicate, recover.
      5. Ethics & Safe Practice — responsible boundaries.
      6. Recon Basics — understanding public footprint exposure.
      7. OSINT Discipline — collect and verify open-source signals.
      8. Domain & DNS Awareness — how names map to systems.
      9. Website/App Fingerprinting Concepts — what stacks reveal.
      10. Email & Identity Footprinting — impersonation awareness.
      11. Network Discovery Concepts — visibility as defense.
      12. Port & Service Exposure — the “doors and windows.”
      13. Enumeration Mindset — when systems leak too much.
      14. Vulnerability Scanning Concepts — how scanners work (defensive view).
      15. Prioritization — severity vs real risk.
      16. Authentication Failures — passwords, tokens, trust.
      17. Post-Compromise Reality — lateral movement and persistence (defender view).
      18. Malware Types & Indicators — what to look for.
      19. Malware Analysis Thinking — static vs dynamic clues (safe, basic).
      20. Traffic Awareness — spotting abnormal patterns.
      21. Interception Concepts — spoofing/MITM risks and defenses.
      22. Social Engineering Defense — phishing and impersonation.
      23. DoS Resilience — staying available under flood.
      24. Sessions & Tokens — how logins get stolen (defender view).
      25. Web App Defense — common weaknesses and fixes.
      26. Input Safety — injection prevention patterns.
      27. API Security — modern front-door controls.
      28. Wireless & Mobile — pocket battlefield hardening.
      29. IoT & OT Risks — devices as doors.
      30. Cloud + Crypto Essentials — identity-first security and encryption basics.

      Disclaimer: This course provides education and training and cannot guarantee a specific job outcome.

      ✅ Belt Test Rules (read before testing)

      Belts are proof of skill. Belts are earned through drills and belt tests.

      Passing score: 80%
      Retries: Unlimited
      Score policy: Best score counts (highest score recorded; retakes cannot lower record)

      Eligibility: completing the required drills unlocks the belt test.

      Question style: fixed quizzes/exams (clear 4‑option multiple choice). This dojo is optimized for speed and consistency of training.

      Optional anti‑spam cooldown (recommended): add a cooldown after failed attempts to reduce rapid guessing and encourage real review.

      Integrity Rules — “You vs AI”

      • No AI tools during belt tests. No chatbots, no auto-answer tools, no “explain this and give me the solution.”
      • No outside help during belt tests (friends, tutors, siblings).
      • Parent presence encouraged during belt tests (nearby / same room) for accountability and safety.

      Notes Policy

      • Drills: open‑notes allowed.
      • Belt tests: closed‑notes or one‑page notes (dojo admin choice).

      Disclaimer: Belts and certificates verify training progress and do not guarantee job outcomes.