NEW OPPORTUNITY

Programming for Everyone

Exciting news! I'll be teaching a comprehensive programming course for young learners in Kalumbila, Zambia.

Age Group: Students aged 10-15 years

Duration: 16 hours over 8 weeks

Technologies: Scratch & Python

Location: Kalumbila, Zambia

Start Date: To be announced soon

New Course Available!

Programming for Everyone - Teaching young minds in Kalumbila, Zambia

Click to learn more →

Hi
I'm Daniel

Cybersecurity student, programmer, and passionate educator bringing technology education to young minds in Zambia.

Daniel Flores
teach.code();

About Me

I was born in Chile and I am currently studying at an International High School. I am getting ready to go to university, where I want to study Cybersecurity and Computer Science.

I enjoy applying what I learn through real projects. In my Cybersecurity Essentials course, I studied how to protect systems, detect attacks, and understand the basics of ethical hacking. I also completed a course called Foundations of Programming, which helped me develop logical thinking and write secure code.

On LinkedIn, I started a series called "Cybersecurity Doses", where I explain difficult cybersecurity topics in a simple way. Some of the topics I talk about include DDoS attacks, digital signatures, and how to control access to information.

Now, I'm excited to share my knowledge with young students in Kalumbila, Zambia, teaching them the fundamentals of programming through an engaging and practical curriculum.

📍 Kalumbila, Zambia

Programming for Everyone

An engaging introduction to computer programming designed specifically for young learners aged 10-15

Programming Course Flyer
16h

Comprehensive Program

16 hours of hands-on learning over 8 weeks, with 2 hours of engaging sessions each week

2

Two Programming Languages

Master both Scratch for visual programming and Python for text-based coding

Project-Based Learning

Create real projects including animations, games, and functional calculators

📅

Registration Opening Soon

Limited spots available - Contact for early enrollment information

What Students Will Learn

Week 1
Introduction to Programming Origins, context, and first steps into the world of coding
Week 2
Scratch Basics Account creation, interface exploration, and basic blocks
Week 3
Advanced Scratch Conditionals, animations, and object control techniques
Week 4
First Project Create and animate your own character in Scratch
Week 5
Python Introduction Installation, print commands, and basic mathematical operations
Week 6
Intermediate Project Build a functional calculator using Python
Week 7
Python Conditionals Master if, elif, else statements and mathematical formulas
Week 8
Final Project Loops, timing, ASCII art, and an advanced calculator

Academic Portfolio

Advanced coursework and practical applications in cybersecurity and software development

AP Course - College Level

AP® Computer Science A

Currently enrolled in this college level course focusing on Java programming and advanced CS concepts. Developing expertise in object oriented design, data structures, algorithms, and problem solving methodologies equivalent to first-semester university computer science.

University of Michigan

Python Programming Certificate

Completed comprehensive certification validating proficiency in Python data structures, web scraping, databases, and application development.

View Certification →
FlexPoint Virtual School

Cybersecurity Essentials

Mastered defensive strategies including IDS/IPS implementation, cryptographic algorithms, access control mechanisms, and network monitoring. Studied real-world attack vectors: DoS/DDoS, port scanning, social engineering, and developed corresponding mitigation strategies.

FlexPoint Virtual School

Foundations of Programming

Built comprehensive Python expertise covering binary systems, ASCII encoding, turtle graphics, procedural vs OOP paradigms, and software development lifecycle. Developed strong foundation in loops, functions, logical operators, and testing methodologies essential for secure coding.

GitHub Project

Web Security Vulnerability Lab

Educational repository demonstrating XSS, SQL injection, and CSRF vulnerabilities with practical defense implementations. Serves as a hands-on learning platform for understanding web application security through ethical hacking principles and secure coding practices.

Explore Repository →
LinkedIn Series

Cybersecurity Doses Publication

Author of educational content series breaking down complex security concepts for the community. Topics include network architecture principles, hacker classifications, attack mechanism analysis, and practical defense strategies. Building thought leadership while learning in public.

Cybersecurity Doses

#4

Enterprise Network Security Architecture

Implementing defense-in-depth strategies requires multilayered security controls:

  • Perimeter Security: Firewalls, DMZ configuration, and access control lists
  • High Availability: Redundancy protocols and failover mechanisms
  • Centralized Management: SIEM integration and log aggregation
  • Zero-Trust Model: Continuous verification and least privilege access

Modern networks must balance security with performance through strategic architecture.

#3

IDS/IPS Implementation and Network Monitoring

Network monitoring serves dual purposes: performance optimization and threat detection. While administrators leverage tools like Wireshark and SNMP for legitimate diagnostics, attackers exploit these same capabilities for reconnaissance. Understanding both perspectives— implementing signature-based and anomaly-based detection while recognizing evasion techniques— is crucial for robust security posture.

#2

DDoS Attack Vectors and Mitigation

Distributed Denial of Service attacks evolved from simple SYN floods to sophisticated application-layer attacks leveraging IoT botnets. Modern mitigation requires rate limiting, traffic scrubbing, anycast distribution, and cloud-based DDoS protection services. Understanding attack amplification techniques helps design resilient infrastructure.

#1

Ethical Hacking and Security Research

The cybersecurity ecosystem depends on ethical researchers:

  • Penetration Testing: Authorized vulnerability assessment and exploitation
  • Bug Bounty Programs: Responsible disclosure and coordinated patches
  • Security Auditing: Compliance verification and risk assessment
  • Threat Intelligence: Proactive defense through attack pattern analysis

Let's Connect

Open to connecting with educational institutions, security professionals, and fellow educators. Currently accepting inquiries about the Programming for Everyone course in Kalumbila. Interested in collaborative projects, educational partnerships, and bringing technology education to young learners.