Virtual Merit Member Conference 2020 Registration Now Open! Only $15 per Member!

REGISTER NOW
skip to Main Content

GOVERNOR'S HIGH SCHOOL

CYBER CHALLENGE
HSCC_BR_2019_OpenNow (1) copy
TOP 10 ROUND 1 TEAMS ANNOUNCED!

Ann Arbor Huron High School – HuronRiverRats1

Ann Arbor Huron High School – HuronRiverRats2

Canton High School – Crickets

Canton High School – RebelRebel

Kalamazoo Area Mathematics and Science Center – K10SDSMRR

Kalamazoo Area Mathematics and Science Center – K11AAENER

Kalamazoo Area Mathematics and Science Center – K12AEAKKO

Notre Dame Preparatory School – Fighting Irish

Okemos High School – CyberchiefsA

West Bloomfield High School – West Bloomfield

GOVERNOR'S HIGH SCHOOL CYBER CHALLENGE

Teams comprised of up to three high school students are invited to participate in a round of challenges designed to test their knowledge of cybersecurity, computer science and information technology.

The only requirements are an interest in cybersecurity and a familiarity with computers. This is a great cybersecurity learning opportunity for all high school students in Michigan.

All schools in Michigan are invited to participate and the challenge is entirely FREE!

WHY PARTICIPATE?

The GHSCC aims to expose students to cybersecurity at no cost to the students or schools. Round 2 participants will be given access to a number of free pre-certification training courses over a variety of cyber security and networking topics. Upon successful completion of free resources administrators can contact Merit to enroll in a complimentary cyber security boot camp and examination.

GHSCC OVERVIEW

  • Only teachers, coaches or chaperones may register teams for the GHSCC.
  • Teams will be composed of 1-3 students and one adult coach.
  • Schools and coaches are encouraged to have multiple teams, however each student may only participate on a single cyber challenge team.
  • Substitutions of players is acceptable. If team count is changed you must notify [email protected].
  • Round 1 is held entirely online and will be scored by staff of the Michigan Cyber Range.
  • Round 2 will be held entirely online.
  • Round 1 and Round 2 are timed challenges.
  • In the event of a tie during Round 1, completion times will be considered and reviewed by the Michigan Cyber Range.
  • In the event of a tie during Round 2, the team with the most flags will be determined the winner.

Collaboration between teams is strictly prohibited. We want to ensure that all participants have an equal opportunity to advance to Round 2, and as such, any activity found to be against the rules or sense of fair play is grounds for disqualification at the sole discretion of Merit Network.

ROUND DESCRIPTIONS

Merit will provide an online practice resource. This online resource can be utilized by parents, instructors and administrators as cybersecurity warm-ups, supplements to curriculum, and more. Round 0 is an unscored challenge.

Round 0 study resources are available throughout the entire competition. You may come back and review these materials at any time.

Round 1 will be held entirely online! The challenges will be released daily starting Monday, September 14th, and ends Thursday, September 17th . The top 10 qualifying teams will be announced Friday, September 18th. Students have between 9:00 A.M. – 6:00 P.M. ET each day to answer the set of multiple choice questions. The daily challenges will focus on networks, programming, operating systems and hacking. Round 1 is a timed open style challenge in which students are encouraged to scour the internet to solve the challenges. The top ten teams will be selected to advance to Round 2.

Round 2 is an exercise in gamified learning. An adult chaperone must be the point of contact between Merit and the teams at all times. During Round 2, teams will compete in a virtual Capture the Flag exercise designed to test their skills with an intensive, scored series of cybersecurity-focused challenges taking place in the virtual city of Alphaville. In this round, students can compare progress with one another on a virtual scoreboard.

Round 2 will take place virtually on Friday, September 25th, 2020, 9 A.M. – 3 P.M. ET.

ROUND 0 STUDY UP!

No registration required. Round 0 consists of reviewing study materials in preparation for the Round 0 Challenges.

Kali Linux

 

Challenge Tracks

ROUND 1 SCENARIO

Round One will consist of four multiple choice quizzes. Each quiz will have eleven questions each where you will be going through a data exfiltration incident. In the incident a cutscene from ZendaSoft’s upcoming video game “KnightWatch” has been leaked. It will be your task to investigate how it happened, obtain any information on who did it, and remediate the issue.

ROUND 2 CAPTURE THE FLAG

Capture the Flag is a learning tool designed to take the stress out of the daunting task of learning cyber security concepts and turning it into a fun, self-paced game. CTF is a means to assess and gain individual skills across a broad range of systems and challenges. Participants traverse through challenges in the game environment using penetration testing and forensic skills to find flags and earn points. They will use the open source tool available on their Kali Linux Virtual Machine to complete the challenges given to them. Each challenge track is built around a specific security skillset, such as website vulnerability exploitation, SQL injection, and cracking weak passwords.

QUESTIONS? EMAIL