Exciting news! I'll be teaching a comprehensive programming course for young learners in Kalumbila, Zambia.
Age Group: Students aged 10-15 years
Duration: 16 hours over 8 weeks
Technologies: Scratch & Python
Location: Kalumbila, Zambia
Start Date: To be announced soon
Programming for Everyone - Teaching young minds in Kalumbila, Zambia
Click to learn more →Cybersecurity student, programmer, and passionate educator bringing technology education to young minds in Zambia.
I was born in Chile and I am currently studying at an International High School. I am getting ready to go to university, where I want to study Cybersecurity and Computer Science.
I enjoy applying what I learn through real projects. In my Cybersecurity Essentials course, I studied how to protect systems, detect attacks, and understand the basics of ethical hacking. I also completed a course called Foundations of Programming, which helped me develop logical thinking and write secure code.
On LinkedIn, I started a series called "Cybersecurity Doses", where I explain difficult cybersecurity topics in a simple way. Some of the topics I talk about include DDoS attacks, digital signatures, and how to control access to information.
Now, I'm excited to share my knowledge with young students in Kalumbila, Zambia, teaching them the fundamentals of programming through an engaging and practical curriculum.
An engaging introduction to computer programming designed specifically for young learners aged 10-15
16 hours of hands-on learning over 8 weeks, with 2 hours of engaging sessions each week
Master both Scratch for visual programming and Python for text-based coding
Create real projects including animations, games, and functional calculators
Limited spots available - Contact for early enrollment information
Advanced coursework and practical applications in cybersecurity and software development
Currently enrolled in this college level course focusing on Java programming and advanced CS concepts. Developing expertise in object oriented design, data structures, algorithms, and problem solving methodologies equivalent to first-semester university computer science.
Completed comprehensive certification validating proficiency in Python data structures, web scraping, databases, and application development.
View Certification →Mastered defensive strategies including IDS/IPS implementation, cryptographic algorithms, access control mechanisms, and network monitoring. Studied real-world attack vectors: DoS/DDoS, port scanning, social engineering, and developed corresponding mitigation strategies.
Built comprehensive Python expertise covering binary systems, ASCII encoding, turtle graphics, procedural vs OOP paradigms, and software development lifecycle. Developed strong foundation in loops, functions, logical operators, and testing methodologies essential for secure coding.
Educational repository demonstrating XSS, SQL injection, and CSRF vulnerabilities with practical defense implementations. Serves as a hands-on learning platform for understanding web application security through ethical hacking principles and secure coding practices.
Explore Repository →Author of educational content series breaking down complex security concepts for the community. Topics include network architecture principles, hacker classifications, attack mechanism analysis, and practical defense strategies. Building thought leadership while learning in public.
Implementing defense-in-depth strategies requires multilayered security controls:
Modern networks must balance security with performance through strategic architecture.
Network monitoring serves dual purposes: performance optimization and threat detection. While administrators leverage tools like Wireshark and SNMP for legitimate diagnostics, attackers exploit these same capabilities for reconnaissance. Understanding both perspectives— implementing signature-based and anomaly-based detection while recognizing evasion techniques— is crucial for robust security posture.
Distributed Denial of Service attacks evolved from simple SYN floods to sophisticated application-layer attacks leveraging IoT botnets. Modern mitigation requires rate limiting, traffic scrubbing, anycast distribution, and cloud-based DDoS protection services. Understanding attack amplification techniques helps design resilient infrastructure.
The cybersecurity ecosystem depends on ethical researchers:
Open to connecting with educational institutions, security professionals, and fellow educators. Currently accepting inquiries about the Programming for Everyone course in Kalumbila. Interested in collaborative projects, educational partnerships, and bringing technology education to young learners.