Inspiring the next generation of cybersecurity professionals 

Sponsored by the National Security Agency and National Science Foundation, GenCyber is a 7-day, residential summer camp open to students of diverse cybersecurity experience. If accepted to the yearly camp cohort, campers will enjoy engaging, hands-on learning opportunities including classroom activities and field trips to NSA Georgia and the Fort Gordon Cyber Center of Excellence. 


goals of the gencyber camp: 

  • Expose high school students to potential careers and issues in cybersecurity. 
  • Teach students to secure their digital lifestyle. 
  • Demonstrate to students why "Internet of Things" devices need to be secured. 
  • Augusta University's program is designed to teach the GenCyber First Principles (listed below), cybersecurity ethics and online safety and hygiene.

subjects covered in gencyber include:

  • Internet of Things
  • Cryptography
  • Cryptanalysis
  • Robotics
  • Python programming

Applications are now open through this Friday, April 30, for GenCyber 2021! Due to COVID-19 restrictions, this year's camp will be a non-residential day camp format this year, the week of June 21-25.

GenCyber 2021 Application

Instructor looking at computer with students
Campers working on robot
Professor looking at computer screen with students
Students working on robot
Group of students and instructors standing together
two girls and a guy sitting down at a table


Contact Us

GenCyber Camp at Augusta University


School of Computer and Cyber Sciences

Facebook Group: GenCyber Camp



GenCyber FAQ's:

GenCyber First Principles




A fancy word for summarizing or explaining in a way that is easily understood.



Able to be inserted or removed from a project, each module has its own function interchangeable with other modules. 

Domain Separation 

Separating areas where resources are located prevents accidents and loss of data, keeping information worlds from colliding. 

Resource Encapsulation 

Resources hardware, system objects, or processes must be separated and used as intended. 

Information Hiding 

Information hiding is any attempt to prevent people from being able to see information. It can be hiding the content of a letter, or it can be applied to hiding how the letter is delivered. 

Process Isolation  

A process occurs when a task is executed. Keeping processes separate prevents the failure of one process from negatively impacting another. 


Cyber security uses multiple layers of defenses for protecting information. If one layer is defeated, then the next one should catch it. 

Simplicity of Design 

The less complicated something is, the less likely it is to have problems. It is also easier to fix and troubleshoot. 

Least Privilege 

One of the ways to protect information is by limiting what people can do with your information and resources. You may allow someone to read a letter, but not edit it. 


Minimization refers to having the least functionality of a program or device. The goal is to simplify and decrease the number of ways the software can be exploited. 

The future starts here. Join the fun.

Applications have closed for GenCyber 2021!