Careers & People
3/20/2017
09:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Registration Opens for U.S. Cyber Quests Competition

The U.S. Cyber Challenge has opened registration for the 2017 Cyber Quests online competition, a workforce development program.

Washington, D.C., March 20, 2017 – Today, U.S. Cyber Challenge opened registration for the 2017 Cyber Quests online competition. The annual Cyber Quests competition determines who qualifies for the U.S. Cyber Challenge (USCC) Summer Cyber Camps, a leading nationwide program in cybersecurity workforce development. While registration just opened today, the actual competition will open on Monday, April 3, 2017, with the competition closing on Sunday, April 23, 2016. To register and compete, visit uscc.cyberquests.org.

"Each year we are amazed at the talent that comes out of the woodwork to participate in our program,” said Karen S. Evans, National Director for USCC. “Competitions like Cyber Quests and in-person programs like our summer camps provide the validation these talented individuals need in order to find their right career path in cybersecurity. We are honored to be an instrumental part in that process.”

The Cyber Quests competition and USCC camps are designed to improve cybersecurity skills, provide training & mentorship from renowned instructors and highlight skills for potential employers. For this specific Cyber Quests, competitors will be provided with forensic artifacts that they must analyze to identify devices, network activity, and attacks.

For Cyber Quests, participants will have 24-hours to complete the competition, beginning from the time they begin answering questions. Winners are determined based on who achieves the highest score in the shortest amount of time, and top performers who are 18 years or older and U.S. citizens, will then be eligible to receive an invitation to one of the week-long Cyber Camps offered across the country. The three camps will be hosted by the University of Delaware, Moraine Valley Community College (Illinois), and Southern Utah University.

Those who attend a USCC Cyber Camp will receive high level instruction from some of the nation’s most talented cybersecurity teachers and practitioners, participate in hands-on lab activities, network with employers at the camp job fair, and compete in a capture-the-flag competition that challenges both their technical skill sets and their ability to work in a team environment.

U.S. Cyber Challenge is supported in part through sponsorships by Cyber Ninjas, NIC, Queen Associates, CyberVista, Monster Government Solutions, Federal CIO Council, Common Knowledge Scholarship Foundation, the Department of Homeland Security, Microsoft, SANS Institute, Lockheed Martin, AFFIRM, (ISC)2 and the Center for Cyber Safety and Education, and Amazon Web Services.
 
For information about becoming a sponsor of a Summer Cyber Camp, contact Karen S. Evans, National Director at [email protected]

To learn more about Cyber Quests, visit the website at USCC.CyberQuests.org. Details about the summer camps are on the U.S. Cyber Challenge website – www.USCyberChallenge.org.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
technicalaccademy
50%
50%
technicalaccademy,
User Rank: Apprentice
3/24/2017 | 2:06:17 AM
Microsoft
Thanks for sharing the this competation updates
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.