Careers & People

3/28/2018
05:37 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Registration Open for U.S. Cyber Challenges Annual Cyber Quests Competition

Top Competitors to Qualify for Summer 2018 Cyber Camps

Washington, D.C., March 28, 2018 – U.S. Cyber Challenge (USCC) opened registration for the 2018 Cyber Quests online competition. The annual Cyber Quests competition determines who qualifies for the U.S. Cyber Challenge Summer Cyber Camps, a leading nationwide program in cybersecurity workforce development. While registration is now open, the actual competition will open on Tuesday, April 10, 2018, with the competition closing on Tuesday, May 1, 2018. To register and compete, visit uscc.cyberquests.org. Everyone is welcome to participate in this free competition.

The Cyber Quests competition and USCC camps are designed to improve cybersecurity skills, provide training & mentorship from renowned instructors and highlight skills for potential employers. For this specific Cyber Quest, competitors will follow the history of cryptography and cryptanalysis by looking at these systems and decrypting the messages to progress through the challenge.   

For Cyber Quests, participants will have 24-hours to complete the competition, beginning from the time they begin answering questions. Winners are determined based on who achieves the highest score in the shortest amount of time, and top performers who are 18 years or older and U.S. citizens will be eligible to receive an invitation to one of the week-long Cyber Camps offered across the country. The four camps will be hosted by Moraine Valley Community College (Palos Park, Illinois), Southern Utah University in collaboration with Cheyenne High School (North Las Vegas, NV), Virginia Tech (Blacksburg, VA), and Wilmington University (Dover, DE).

Those who attend a USCC Cyber Camp will receive high level instruction from some of the nation’s most talented cybersecurity teachers and practitioners, participate in hands-on lab activities, network with employers at the camp job fair, and compete in a capture-the-flag competition that challenges both their technical skill sets and their ability to work in a team environment.

USCC also manages CyberCompEx.org – a cybersecurity-specific online community serving as a platform to continue conversations and learning beyond the 5-day camp program. CyberCompEx.org is a community where anyone can contribute ideas and resources about cybersecurity, network with others in the field, and ultimately build their skillsets to further their career and strengthen the cybersecurity workforce landscape.

U.S. Cyber Challenge is supported in part through sponsorships by Accenture and Defense Point Security, AFFIRM, Amazon Web Services, CenturyLink, Common Knowledge Scholarship Foundation, Cyber Ninjas, the Department of Homeland Security, Duo, Federal CIO Council, Lockheed Martin, Microsoft, Monster Government Solutions, NIC, SANS Institute, the Center for Cyber Safety and Education, Sherman Consulting, and Unisys.
 
For information about becoming a sponsor of a Summer Cyber Camp, contact Karen S. Evans, National Director at [email protected].

To learn more about Cyber Quests, visit the website at USCC.CyberQuests.org. Details about the summer camps are on the USCC website – www.USCyberChallenge.org.

                                                                     ###

About U.S. Cyber Challenge:

U.S. Cyber Challenge (USCC) is a program supported by the Department of Homeland Security Science and Technology Directorate through a contract with the Center for Internet Security, a 501(c)3 organization, and has the mission to significantly reduce the shortage in the cyber workforce by serving as the premier program to identify, attract, recruit and place the next generation of cybersecurity professionals. USCC’s goal is to find 10,000 of America’s best and brightest to fill the ranks of cybersecurity professionals where their skills can be of the greatest value to the nation. For more information, visit www.USCyberChallenge.org

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-13435
PUBLISHED: 2018-08-16
** DISPUTED ** An issue was discovered in the LINE jp.naver.line application 8.8.0 for iOS. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method to disable passcode authentication. NOTE: the vendor indicates that this is not an attack of interest w...
CVE-2018-13446
PUBLISHED: 2018-08-16
** DISPUTED ** An issue was discovered in the LINE jp.naver.line application 8.8.1 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authenticate with an arbitrary passcode. ...
CVE-2018-14567
PUBLISHED: 2018-08-16
libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.
CVE-2018-15122
PUBLISHED: 2018-08-16
An issue found in Progress Telerik JustAssembly through 2018.1.323.2 and JustDecompile through 2018.2.605.0 makes it possible to execute code by decompiling a compiled .NET object (such as DLL or EXE) with an embedded resource file by clicking on the resource.
CVE-2018-11509
PUBLISHED: 2018-08-16
ASUSTOR ADM 3.1.0.RFQ3 uses the same default root:admin username and password as it does for the NAS itself for applications that are installed from the online repository. This may allow an attacker to login and upload a webshell.