Careers & People

3/20/2017
09:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Registration Opens for U.S. Cyber Quests Competition

The U.S. Cyber Challenge has opened registration for the 2017 Cyber Quests online competition, a workforce development program.

Washington, D.C., March 20, 2017 – Today, U.S. Cyber Challenge opened registration for the 2017 Cyber Quests online competition. The annual Cyber Quests competition determines who qualifies for the U.S. Cyber Challenge (USCC) Summer Cyber Camps, a leading nationwide program in cybersecurity workforce development. While registration just opened today, the actual competition will open on Monday, April 3, 2017, with the competition closing on Sunday, April 23, 2016. To register and compete, visit uscc.cyberquests.org.

"Each year we are amazed at the talent that comes out of the woodwork to participate in our program,” said Karen S. Evans, National Director for USCC. “Competitions like Cyber Quests and in-person programs like our summer camps provide the validation these talented individuals need in order to find their right career path in cybersecurity. We are honored to be an instrumental part in that process.”

The Cyber Quests competition and USCC camps are designed to improve cybersecurity skills, provide training & mentorship from renowned instructors and highlight skills for potential employers. For this specific Cyber Quests, competitors will be provided with forensic artifacts that they must analyze to identify devices, network activity, and attacks.

For Cyber Quests, participants will have 24-hours to complete the competition, beginning from the time they begin answering questions. Winners are determined based on who achieves the highest score in the shortest amount of time, and top performers who are 18 years or older and U.S. citizens, will then be eligible to receive an invitation to one of the week-long Cyber Camps offered across the country. The three camps will be hosted by the University of Delaware, Moraine Valley Community College (Illinois), and Southern Utah University.

Those who attend a USCC Cyber Camp will receive high level instruction from some of the nation’s most talented cybersecurity teachers and practitioners, participate in hands-on lab activities, network with employers at the camp job fair, and compete in a capture-the-flag competition that challenges both their technical skill sets and their ability to work in a team environment.

U.S. Cyber Challenge is supported in part through sponsorships by Cyber Ninjas, NIC, Queen Associates, CyberVista, Monster Government Solutions, Federal CIO Council, Common Knowledge Scholarship Foundation, the Department of Homeland Security, Microsoft, SANS Institute, Lockheed Martin, AFFIRM, (ISC)2 and the Center for Cyber Safety and Education, and Amazon Web Services.
 
For information about becoming a sponsor of a Summer Cyber Camp, contact Karen S. Evans, National Director at [email protected]

To learn more about Cyber Quests, visit the website at USCC.CyberQuests.org. Details about the summer camps are on the U.S. Cyber Challenge website – www.USCyberChallenge.org.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
technicalaccademy
50%
50%
technicalaccademy,
User Rank: Apprentice
3/24/2017 | 2:06:17 AM
Microsoft
Thanks for sharing the this competation updates
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
10 Ways to Protect Protocols That Aren't DNS
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10869
PUBLISHED: 2018-07-19
redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd.
CVE-2018-10870
PUBLISHED: 2018-07-19
redhat-certification does not properly sanitize paths in rhcertStore.py:__saveResultsFile. A remote attacker could use this flaw to overwrite any file, potentially gaining remote code execution.
CVE-2018-12959
PUBLISHED: 2018-07-19
The approveAndCall function of a smart contract implementation for Aditus (ADI), an Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer all contract balances into their account).
CVE-2018-14336
PUBLISHED: 2018-07-19
TP-Link WR840N devices allow remote attackers to cause a denial of service (connectivity loss) via a series of packets with random MAC addresses.
CVE-2018-10620
PUBLISHED: 2018-07-19
AVEVA InduSoft Web Studio v8.1 and v8.1SP1, and InTouch Machine Edition v2017 8.1 and v2017 8.1 SP1 a remote user could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event related actions such as read and write, with potential for code t...