Careers & People

3/28/2018
05:37 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Registration Open for U.S. Cyber Challenges Annual Cyber Quests Competition

Top Competitors to Qualify for Summer 2018 Cyber Camps

Washington, D.C., March 28, 2018 – U.S. Cyber Challenge (USCC) opened registration for the 2018 Cyber Quests online competition. The annual Cyber Quests competition determines who qualifies for the U.S. Cyber Challenge Summer Cyber Camps, a leading nationwide program in cybersecurity workforce development. While registration is now open, the actual competition will open on Tuesday, April 10, 2018, with the competition closing on Tuesday, May 1, 2018. To register and compete, visit uscc.cyberquests.org. Everyone is welcome to participate in this free competition.

The Cyber Quests competition and USCC camps are designed to improve cybersecurity skills, provide training & mentorship from renowned instructors and highlight skills for potential employers. For this specific Cyber Quest, competitors will follow the history of cryptography and cryptanalysis by looking at these systems and decrypting the messages to progress through the challenge.   

For Cyber Quests, participants will have 24-hours to complete the competition, beginning from the time they begin answering questions. Winners are determined based on who achieves the highest score in the shortest amount of time, and top performers who are 18 years or older and U.S. citizens will be eligible to receive an invitation to one of the week-long Cyber Camps offered across the country. The four camps will be hosted by Moraine Valley Community College (Palos Park, Illinois), Southern Utah University in collaboration with Cheyenne High School (North Las Vegas, NV), Virginia Tech (Blacksburg, VA), and Wilmington University (Dover, DE).

Those who attend a USCC Cyber Camp will receive high level instruction from some of the nation’s most talented cybersecurity teachers and practitioners, participate in hands-on lab activities, network with employers at the camp job fair, and compete in a capture-the-flag competition that challenges both their technical skill sets and their ability to work in a team environment.

USCC also manages CyberCompEx.org – a cybersecurity-specific online community serving as a platform to continue conversations and learning beyond the 5-day camp program. CyberCompEx.org is a community where anyone can contribute ideas and resources about cybersecurity, network with others in the field, and ultimately build their skillsets to further their career and strengthen the cybersecurity workforce landscape.

U.S. Cyber Challenge is supported in part through sponsorships by Accenture and Defense Point Security, AFFIRM, Amazon Web Services, CenturyLink, Common Knowledge Scholarship Foundation, Cyber Ninjas, the Department of Homeland Security, Duo, Federal CIO Council, Lockheed Martin, Microsoft, Monster Government Solutions, NIC, SANS Institute, the Center for Cyber Safety and Education, Sherman Consulting, and Unisys.
 
For information about becoming a sponsor of a Summer Cyber Camp, contact Karen S. Evans, National Director at [email protected].

To learn more about Cyber Quests, visit the website at USCC.CyberQuests.org. Details about the summer camps are on the USCC website – www.USCyberChallenge.org.

                                                                     ###

About U.S. Cyber Challenge:

U.S. Cyber Challenge (USCC) is a program supported by the Department of Homeland Security Science and Technology Directorate through a contract with the Center for Internet Security, a 501(c)3 organization, and has the mission to significantly reduce the shortage in the cyber workforce by serving as the premier program to identify, attract, recruit and place the next generation of cybersecurity professionals. USCC’s goal is to find 10,000 of America’s best and brightest to fill the ranks of cybersecurity professionals where their skills can be of the greatest value to the nation. For more information, visit www.USCyberChallenge.org

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
Jai Vijayan, Freelance writer,  2/12/2019
Up to 100,000 Reported Affected in Landmark White Data Breach
Kelly Sheridan, Staff Editor, Dark Reading,  2/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8358
PUBLISHED: 2019-02-16
In Hiawatha before 10.8.4, a remote attacker is able to do directory traversal if AllowDotFiles is enabled.
CVE-2019-8354
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
CVE-2019-8355
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.
CVE-2019-8356
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.
CVE-2019-8357
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.