Teams comprised of up to three high school students are invited to participate in a round of challenges designed to test their knowledge of cybersecurity, computer science and information technology.
The only requirements are an interest in cybersecurity and a familiarity with computers. This is a great cybersecurity learning opportunity for all high school students in Michigan.
All schools in Michigan are invited to participate and the challenge is entirely FREE!
By the year 2020 there will be an estimated 3.5 million unfilled cybersecurity jobs in the US. According to National Initiative for Cybersecurity Education (NICE), one of the main reasons students don’t pursue cybersecurity as a career field is simply a lack of exposure. The GHSCC aims to expose students to cybersecurity at no cost to the students or schools.
Round 2 participants will receive access to a certification course (self paced by student) and exam over a 6 month period commencing at the end of Round 2. Communication should run through the teacher/chaperone. Teachers will be given course vouchers to disseminate to their students within 2 weeks of the close of Round 2. Upon completion of the course, voucher codes and instructions will be provided for students to schedule their exam. Students must complete both the course and exam within 6 months of the end of Round 2. Results of the exam must be reported to High School Cyber Challenge at [email protected] no later than April 27, 2020.
- Only teachers, coaches or chaperones may register teams for the GHSCC.
- Teams will be composed of 1-3 students and one adult coach.
- Schools and coaches are encouraged to have multiple teams, however each student may only participate on a single cyber challenge team.
- Substitutions of players is acceptable. If team count is changed you must notify [email protected].
- Round 1 is held entirely online and will be scored by staff of the Michigan Cyber Range.
- Round 1 and Round 2 are timed challenges.
- In the event of a tie during Round 1, completion times will be considered and reviewed by the Michigan Cyber Range.
- In the event of a tie during Round 2, team strategy will be measured by the Michigan Cyber Range to determine the winner.
Merit will provide an online practice resource. This online resource can be utilized by parents, instructors and administrators as cybersecurity warm-ups, supplements to curriculum, and more. Round 0 is an unscored challenge.
Round 0 study resources are available throughout the entire competition. You may come back and review these materials at any time.
Round 1 will be held entirely online! The challenges will be released daily starting Monday, September 30th, and ends Thursday, October 3rd. The top 10 qualifying teams will be announced Friday, October 4th. Students have between 9:00am-6:00pm ET each day to answer the set of multiple choice questions. The daily challenges will focus on networks, programming, operating systems and hacking. Round 1 is a timed open style challenge in which students are encouraged to scour the internet to solve the challenges. The top ten teams will be selected to advance to Round 2.
Round 2 is an exercise in gamified learning. Should any qualifying team be unable to afford travel or accommodations, stipends will be provided. An adult chaperone must accompany the team at all times. During Round 2, teams will compete in a virtual Capture the Flag exercise designed to test their skills with an intensive, scored series of cybersecurity-focused challenges taking place in the virtual city of Alphaville. In this round, the students will be able to interact with each other and compare progress with one another on a public scoreboard.
Round 2 will take place at the TCF Center on Monday, October 28, 2019.
No registration required. Round 0 consists of reviewing study materials in preparation for the Round 0 Challenges.
- Programming (Python, powershell, bash)
- Networking (DHCP service, tracert, nslookup, route, firewall)
- Basic Linux Commands (passwd, systemctl, tar, gzip, rm, scp)
- Windows Admin (Net command)
- Database admin
- Find PII (Library, SQL Database vulnerabilities, SSH, Service Discovery)
- School (OpenSSL, Encryption, Windows Exploitation, Reverse Engineering)
- Deface the Website (Cityhall, PHP, SSH Brute Force)
- Are you SCADA the dark (SSH, Python)
- Zenda (Incident Response & Forensics, Malware, Windows)
- Python 101
- Reconnaissance 101
- Powershell 101/102
- Networking 101
- Cryptography 101
Your second year of college is over and you’re about to start your first summer internship as the IT administrator for a small non-profit, Tirem. You constitute the entire IT staff for this company. You’ve been given responsibility for a Linux web server, a Windows 2016 server, and various laptops throughout the office.
Throughout the summer your job will progress through various stages. Your first stage will be to figure out where everything is. Next, you’ll need to fix all the things which are broken or have been left over from the previous IT employee. Finally, after cleaning up the big messes, you’ll be able to concentrate on improving the services and responding to normal service tickets. As part of your job you are expected to access any references you can in order to solve your problems, and your solutions should focus on automation instead of manual repetitive tasks.
Capture the Flag is a learning tool designed to take the stress out of the daunting task of learning cyber security concepts and turning it into a fun, self-paced game. CTF is a means to assess and gain individual skills across a broad range of systems and challenges. Participants traverse through challenges in the game environment using penetration testing and forensic skills to find flags and earn points. Each challenge track is built around a specific security skillset, such as website vulnerability exploitation, SQL injection, and cracking weak passwords.