top of page

Cyber Cadet Portal (Demo)

Dashboard

Modules

Missions

Achievements

Profile

Logout

Teacher

Welcome to the STEM Learning Dashboard

Start your onboarding

  • Begin with an interactive welcome video.

Cadet Monthly Training

Week 1: Learn

  • Video or interactive lesson on a cybersecurity principle (e.g., phishing, ports, or firewalls)

  • Small knowledge check or mini-lab

Week 2: Apply

  • Guided lab scenario or tool-based activity

  • Skills focus (e.g., packet tracing, log analysis)

Week 3: Defend

  • Real-world use case or micro incident-response challenge

  • Cadets practice writing a mini after-action report (AAR)

Week 4: Challenge Mission

  • “End-of-Month Cadet Challenge”

  • Scenario: “Defend the School Network” or “Intercept the Adversary”

Week 2: Apply

Domain:  Network Security (DS-100)

Sub-Domain: Packet Tracing 101

Overview

 

Every time you visit a website, send a message, or stream a video, data flows through a series of digital pathways called packets. Understanding these packets is essential to becoming a strong cybersecurity cadet. This week, you’ll learn how data moves through a network and how to trace that movement like a digital detective.

 

Packet tracing is the process of monitoring and analyzing how data moves across a network, one packet at a time. Each packet contains information like where it came from, where it’s going, and what type of communication it involves. Just like detectives examine clues at a crime scene, cybersecurity cadets learn to inspect packets to understand what’s happening beneath the surface of digital communications. Whether a packet is part of a standard web request or an early sign of a cyberattack, learning to trace and interpret it is one of the most essential skills in network defense.

​

At the core of packet tracing lies the ability to read the structure of a packet. Most packets comprise two key parts: the header and the payload. The header contains metadata like source and destination IP addresses, port numbers, and the protocol (such as TCP or UDP). The payload carries the actual content, like the text of a message or a login request. When cadets use tools like Wireshark or browser-based simulators to trace packets, they learn to decode these layers and recognize patterns that indicate secure or suspicious behavior.

​

Cadets begin to ‘see’ the invisible traffic flowing through networks by mastering packet tracing. This visibility is essential for defending systems against malware, unauthorized access, or data exfiltration. Instead of guessing what’s wrong, skilled defenders use packet data to pinpoint anomalies, confirm attacks, and take action. From school Wi-Fi to national defense systems, the fundamentals of packet tracing apply everywhere—and it all starts with learning how to follow the path of a single packet.

Are You Ready, Cadet!
Lauch Your Mission.

bottom of page