General
Section outline
-
-

-
Ninjutsu – Cybersecurity
AI is supercharging scams, hacks, and deception — train your teen to fight back with real security skills.
Ninjutsu wins through stealth, awareness, and control. Cybersecurity is modern ninjutsu: see the attack before it lands, shut the door before it opens, and disappear from easy targets.
✅ Start here (free)
Start at Lesson 1 and move forward. Each lesson is broken into micro‑presentations (short, clear screens — one concept at a time). This makes training realistic even with school and distractions.
- Learn: read the micro‑presentations
- (Paid) Drill: take the quiz and record your score
- Prove: pass the belt exam to rank up
Ninjutsu rule: stay invisible to easy attacks. Reduce exposure, build discipline, and don’t become a target.
👨👩👧 For parents: why this course matters
AI has scaled cyber threats: phishing, impersonation, password attacks, and automated scanning. This course trains teens to think like defenders: verify reality, recognize threats, reduce exposure, and build safer habits.
The goal is not “cool hacking.” The goal is defensive discipline: awareness, prevention, safe decision-making, and understanding how attacks unfold so they can be stopped.
Disclaimer: This course builds skills and discipline. It does not guarantee certifications, jobs, or outcomes.
🎯 For teens: the mission
Train like a defender in the shadows: spot traps, read systems, and lock them down. AI can generate confident “answers.” You’ll train what’s true, what’s risky, and what actually protects you.
- Be hard to fool: resist scams, impersonation, and manipulation
- Be hard to steal from: protect accounts, devices, and data
- Be hard to track: reduce your public footprint
- Earn belts: prove your skills under pressure
If you like strategy and “seeing the trap before it happens,” send this course to a friend.
🧠 What your teen will learn
- Security goals and threat thinking (how breaches unfold)
- Recon and footprint awareness (what’s exposed and why it matters)
- Network and service exposure concepts (“doors and windows”)
- Vulnerability scanning concepts and prioritization (defensive viewpoint)
- Authentication failures and defensive countermeasures
- Malware awareness and basic analysis thinking (safe, defender-oriented)
- Traffic awareness and interception risks (defender view)
- Social engineering defense habits
- Web application security fundamentals (common weaknesses + fixes)
- Wireless/mobile/IoT/cloud risk thinking and hardening essentials
- Cryptography basics: encryption, hashing, keys, signatures
🛡️ Ethics & safety rules (important)
- Defensive course. This dojo trains protection, not harm.
- No targeting real systems. Only learn on your own accounts/devices or authorized training environments.
- Permission is the line. “I was curious” is not a defense.
- Parent involvement encouraged for belt tests and accountability.
Ninjutsu mindset: control yourself first. Then control your security.
🥋 How training works (simple + structured)
- Short training slides (micro‑presentations; one idea per screen)
- (Paid) Auto‑graded drills/quizzes with retries
- (Paid) Belt exams to prove progress
- Moodle tracking: scores, completion, progress history
- No technical DM support required — progress is designed to be independent
Learn → drill → test → rank up. That’s the dojo system.
🥋 Belt map
Lesson ranges refer to the course training forms.
- White Belt (Lessons 1–5) — Shadow Code Fundamentals
Security goals, threat models, risk thinking, incident basics, ethics/laws/safe practice. - Yellow Belt (Lessons 6–10) — Leave No Footprints
Public footprint, OSINT discipline, domain/DNS awareness, web presence clues, identity/email exposure. - Orange Belt (Lessons 11–13) — Map the Battlefield
Network discovery concepts, ports/services as “doors,” and enumeration mindset. - Green Belt (Lessons 14–17) — Find Weak Points, Fix First
Vulnerability scanning concepts, prioritization, authentication failures, post-compromise awareness. - Blue Belt (Lessons 18–21) — Read the Wire
Malware indicators, analysis thinking, traffic awareness, interception/MITM concepts and counter-moves. - Brown Belt (Lessons 22–24) — Human Firewall
Social engineering defense, DoS resilience mindset, session/token risks and countermeasures. - Black Belt (Lessons 25–30) — Master of Defense Systems
Web + API defense concepts, wireless/mobile risks, IoT/OT risks, cloud + crypto essentials.
Black Belt Test: comprehensive final exam.
Belts are proof. Parents get visibility. Teens get momentum.
🏷️ Free vs Dojo Membership (paid)
Free (Guest Training)
- Access the free lesson content (training slides / micro‑presentations)
- See the curriculum + belt map
- Preview the dojo structure
Dojo Membership (Paid)
- Full access to all drills, quizzes, and belt tests
- Belt tracking and certificates
- Parent visibility of progress and scores inside Moodle
Founders / Inauguration Price: $5 per course for 30 days (about the price of a coffee). This is the launch price while the dojo is expanding — as more belts, exams, and courses are added, the price will rise.
📚 Curriculum / Training Forms (30 lessons)
- The Ninja Code — what security protects and how defenders think.
- Threat Thinking — attack lifecycle models and defensive mapping.
- Risk Management — prioritize what matters.
- Incident Readiness — contain, eradicate, recover.
- Ethics & Safe Practice — responsible boundaries.
- Recon Basics — understanding public footprint exposure.
- OSINT Discipline — collect and verify open-source signals.
- Domain & DNS Awareness — how names map to systems.
- Website/App Fingerprinting Concepts — what stacks reveal.
- Email & Identity Footprinting — impersonation awareness.
- Network Discovery Concepts — visibility as defense.
- Port & Service Exposure — the “doors and windows.”
- Enumeration Mindset — when systems leak too much.
- Vulnerability Scanning Concepts — how scanners work (defensive view).
- Prioritization — severity vs real risk.
- Authentication Failures — passwords, tokens, trust.
- Post-Compromise Reality — lateral movement and persistence (defender view).
- Malware Types & Indicators — what to look for.
- Malware Analysis Thinking — static vs dynamic clues (safe, basic).
- Traffic Awareness — spotting abnormal patterns.
- Interception Concepts — spoofing/MITM risks and defenses.
- Social Engineering Defense — phishing and impersonation.
- DoS Resilience — staying available under flood.
- Sessions & Tokens — how logins get stolen (defender view).
- Web App Defense — common weaknesses and fixes.
- Input Safety — injection prevention patterns.
- API Security — modern front-door controls.
- Wireless & Mobile — pocket battlefield hardening.
- IoT & OT Risks — devices as doors.
- Cloud + Crypto Essentials — identity-first security and encryption basics.
Disclaimer: This course provides education and training and cannot guarantee a specific job outcome.
✅ Belt Test Rules (read before testing)
Belts are proof of skill. Belts are earned through drills and belt tests.
Passing score: 80%
Retries: Unlimited
Score policy: Best score counts (highest score recorded; retakes cannot lower record)Eligibility: completing the required drills unlocks the belt test.
Question style: fixed quizzes/exams (clear 4‑option multiple choice). This dojo is optimized for speed and consistency of training.
Optional anti‑spam cooldown (recommended): add a cooldown after failed attempts to reduce rapid guessing and encourage real review.
Integrity Rules — “You vs AI”
- No AI tools during belt tests. No chatbots, no auto-answer tools, no “explain this and give me the solution.”
- No outside help during belt tests (friends, tutors, siblings).
- Parent presence encouraged during belt tests (nearby / same room) for accountability and safety.
Notes Policy
- Drills: open‑notes allowed.
- Belt tests: closed‑notes or one‑page notes (dojo admin choice).
Disclaimer: Belts and certificates verify training progress and do not guarantee job outcomes.
-