Inspiring the next generation of cybersecurity professionals 

Sponsored by the National Security Agency and National Science Foundation, GenCyber is a 6-day, residential summer camp open to students of diverse cybersecurity experience. If accepted to the yearly camp cohort, campers will enjoy engaging, hands-on learning opportunities including classroom activities and field trips to NSA Georgia and the Fort Gordon Cyber Center of Excellence. 

GenCyber 2023 June 10th- 16th

Applications closed for 2023


Goals of the GenCyber Camp: 

  • Expose high school students to potential careers and issues in cybersecurity. 
  • Teach students to secure their digital lifestyle. 
  • Demonstrate to students why "Internet of Things" devices need to be secured. 
  • Augusta University's program is designed to teach the GenCyber First Principles (listed below), cybersecurity ethics and online safety and hygiene.

Subjects covered in GenCyber include:

GenCyber Cybersecurity Concepts: Defense in Depth, Confidentiality, Integrity, Availability, Thinking like an Adversary, and Keeping it Simple 

In addition to these cybersecurity concepts, Augusta University's GenCyber program will also cover:

  • Cryptography
  • Cryptanalysis
  • Robotics
  • Python programming
students working together
Campers holding robot
campers building a robot
research poster presentation
students working together on robot
students presenting research poster

Contact Us

GenCyber Camp at Augusta University


School of Computer and Cyber Sciences

Facebook Group: GenCyber Camp



GenCyber FAQ's

GenCyber First Principles




A fancy word for summarizing or explaining in a way that is easily understood.



Able to be inserted or removed from a project, each module has its own function interchangeable with other modules. 

Domain Separation


Separating areas where resources are located prevents accidents and loss of data, keeping information worlds from colliding. 

Resource Encapsulation


Resources hardware, system objects, or processes must be separated and used as intended. 

Information Hiding


Information hiding is any attempt to prevent people from being able to see information. It can be hiding the content of a letter, or it can be applied to hiding how the letter is delivered. 

Process Isolation


A process occurs when a task is executed. Keeping processes separate prevents the failure of one process from negatively impacting another. 



Cyber security uses multiple layers of defenses for protecting information. If one layer is defeated, then the next one should catch it. 

Simplicity of Design


The less complicated something is, the less likely it is to have problems. It is also easier to fix and troubleshoot. 

Least Privilege


One of the ways to protect information is by limiting what people can do with your information and resources. You may allow someone to read a letter, but not edit it. 



Minimization refers to having the least functionality of a program or device. The goal is to simplify and decrease the number of ways the software can be exploited. 

The future starts here. Join the fun.