Organization

Cyber Challenge

The Cyber Challenge competition is hosted by MITRE Corporation. It is an online, capture-the-flag competition in which teams score by solving challenges of different difficulties. Challenges include topics involving Binary Exploitation, Computer Forensics, Cryptography, Networking, and Web Exploitation. Each challenge has a message that must be found by performing tasks such as SQL injection, decryption, cross-site scripting, packet filtering, and more.

National Collegiate Cyber Defense Competition (CCDC)

The National Collegiate Cyber Defense Competition is an annual two day competition in the Spring that offers interested students a chance to apply their knowledge at managing and protecting a fully operational company's computer environment. Competitors are given approximately one hour to familiarize themselves with the environment before a team of professional penetration testers starts attacking. Teams are required to maintain the environment and address company needs while protecting it from the red team.

National Cyber League (NCL)

The National Cyber League is a cyber security competition based on the Comptia Security+ exam objectives. The competition takes place in an online, secure environment. The NCL is structured to have multiple events covering different areas of cyber security spread out over a several month period, leading up to a championship competition. Material covered includes password security, cryptography, steganography, log analysis and recovery, network data analysis, and web application vulnerability detection.

Panoply

Panopoly is a state-wide competition in October that emphasizes cyber security. The goal of the competition is to find vulnerable servers on a network and secure them. Competitors strive to gain and keep control over network computers, planting flags on each system they secure in order to gain points. These flags are unique codes that identify a team's ownership and authority over a network service. The six hour event consists of intense penetration testing, password strength testing, and identifying insecure server configurations and operating system weaknesses to locate vulnerabilities, which findings are then used to harden the operating systems, restore services to secure configurations. and plant a flag of ownership for each service to gain points.