Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/12/2018
09:55 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

US Cyber Challenge Kicks Off 2018 Camp Season at Virginia Tech

Aspiring cybersecurity talent will participate in competitions and intensive training.

Blacksburg, VA, June 11, 2018 – U.S. Cyber Challenge kicks off its 2018 boot camp season next week at Virginia Tech in Blacksburg, Virginia for the Eastern Regional Cyber Camp. Camp participants qualified for the program based on their scores from the Cyber Quest competition (www.CyberQuests.org) in April and will spend the week receiving intensive instruction by some of the nation’s leading cybersecurity experts. The camp begins next Monday, June 18th and ends Friday, June 22nd with a Capture-the-Flag (CTF) competition and Award Ceremony recognizing all camp participants and specifically the winners of the CTF competition. Friday’s competition will test both individual performance and team performance, and the winners will receive scholarships from (ISC)2 at the Award Ceremony immediately following the CTF.

“Each year, through our online competition Cyber Quests, USCC identifies the nation’s leading talent in cybersecurity,” stated National Director Karen S. Evans. “Our goal is to help these talented individuals strengthen their skill sets in information security and begin a path toward their dream career and securing our nation’s government and economy.”

Next week’s intensive classwork programming will include the following classes: Cybersecurity Program Analysis, Windows Memory Forensics, WebAppPenTest 2018, and Packet Crafting with Scapy. On Wednesday, June 20th, the camp will host an Executive Roundtable luncheon. This luncheon will foster conversation between seasoned professionals from various organizations and camp participants about the needs our country has today for talented individuals in cybersecurity and the hurdles employers face in both acquiring talent and retaining the talent. The Executive Roundtable is open to the media. For more information about the Eastern Regional camp, visit the webpage athttps://security.vt.edu/cyber_challenge.html.

The Eastern Regional camp is supported in part through partnerships with Amazon Web Services, the Association for Federal Information Resources Management (AFFIRM), Adaptive Cyber, Center for Cyber Safety & Education, Center for Internet Security, CenturyLink, Cyber Ninjas, Defense Point Security LLC, the Department of Homeland Security, the Federal CIO Council, (ISC)2, Monster Government Solutions, NIC, SANS Institute, and Sherman Consulting. Local sponsorship includes Virginia Tech’s Division of Information Technology.

The 2018 Cyber Summer Camp Series features four week-long camps located in Delaware, Illinois, Nevada and Virginia. In line with the mission of USCC’s parent organization, the Center for Internet Security (www.CISecurity.org), the camps are an integral part in the mission to identify and develop cybersecurity talent in order to reduce the nation’s cybersecurity workforce gap and safeguard private and public organizations from cyber threats. Participants in USCC programming are encouraged to continue developing their skills and network with like-minded individuals by becoming active members in CyberCompEx.org, an online social community specifically for cybersecurity enthusiasts. 

For more information about the Cyber Camp program and each of the specific camps, visit U.S. Cyber Challenge online at www.uscyberchallenge.org

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13817
PUBLISHED: 2020-06-04
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attac...
CVE-2020-13818
PUBLISHED: 2020-06-04
In Zoho ManageEngine OpManager before 125144, when <cachestart> is used, directory traversal validation can be bypassed.
CVE-2020-6640
PUBLISHED: 2020-06-04
An improper neutralization of input vulnerability in the Admin Profile of FortiAnalyzer may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the Description Area.
CVE-2020-9292
PUBLISHED: 2020-06-04
An unquoted service path vulnerability in the FortiSIEM Windows Agent component may allow an attacker to gain elevated privileges via the AoWinAgt executable service path.
CVE-2019-16150
PUBLISHED: 2020-06-04
Use of a hard-coded cryptographic key to encrypt security sensitive data in local storage and configuration in FortiClient for Windows prior to 6.4.0 may allow an attacker with access to the local storage or the configuration backup file to decrypt the sensitive data via knowledge of the hard-coded ...