Contestant Requirements:

Similar documents
CyberNEXS Global Services

THE SAN DIEGO MAYORS CYBER CUP (SDMCC) ORIENTATION 10 NOVEMBER 2015

The Open Cyber Challenge Platform *

Symantec Cyber Readiness Challenge Player s Manual

INTERNATIONAL CYBEREX 2015

Cyber Exercises, Small and Large

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Securing Networks, Securing Futures

Technology Fee Proposal

2015 CyberPatriot Conference

2011 Cisco NetRiders EMEA National Competitions Frequently Asked Questions (FAQ)

Cyber Defense Operations Graduate Certificate

Cyber Learning Solutions

Information Security Engineering

OVERVIEW DEGREES & CERTIFICATES

Data Access Request Service

Hackers are here. Where are you?

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

University Road Show 2015

Introduction to Cyber Defense Competition. Module 16

Small-Scale Cyber Security Competitions

Creating a Linux Virtual Machine using Virtual Box

IDS and Penetration Testing Lab ISA656 (Attacker)

Virtual Learning Tools in Cyber Security Education

Penetration Testing LAB Setup Guide

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett

Hackers are here. Where are you?

IDS and Penetration Testing Lab ISA 674

Cybersecurity Health Check At A Glance

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Cyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security

Protecting against cyber threats and security breaches

CYBER SECURITY TRAINING SAFE AND SECURE

HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU

Lab 12: Mitigation and Deterrent Techniques - Anti-Forensic

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Cybersecurity Certificate Programs

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Vulnerability analysis

EC-Council Certified Security Analyst (ECSA)

The SIEM Evaluator s Guide

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

A New Era. A New Edge. Phishing within your company

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

NETWORK SECURITY (W/LAB) Course Syllabus

White Paper The Dynamic Nature of Virtualization Security

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Incident Response. Six Best Practices for Managing Cyber Breaches.

Post Exploitation. n00bpentesting.com

How To Manage Security On A Networked Computer System

CHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING

Course Descriptions November 2014

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Security Event Management. February 7, 2007 (Revision 5)

Learning and Playing: Integrating Competition Experiences Into Formal Curriculum CS Palos Hills, IL

How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment?

Analysis of Network Beaconing Activity for Incident Response

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

INFORMATION SECURITY TRAINING CATALOG (2015)

The fast track to top skills and top jobs in cyber. Guaranteed.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT THREE. Computer Basics and Virtual Machines.

Experiences with Honey-Patching in Active Cyber Security Education

Guide for Designing Cyber Security Exercises

Firewalls and Software Updates

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

A Case for Managed Security

WA2192 Introduction to Big Data and NoSQL. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1

Intro to Virtualization

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Creating a Windows XP Virtual Machine using Virtual Box

Ovation Security Center Data Sheet

Budget Challenge is an award-winning and patented program for young people to EXPERIENCE how to manage money in a

Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner

SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *

Extreme Networks Security Upgrade Guide

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Unified Security Management and Open Threat Exchange

Combating a new generation of cybercriminal with in-depth security monitoring

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study

Transcription:

2014 Overview

Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn and improve cybersecurity skills Enhance: Teamwork, collaboration, critical thinking Enrich: Compete for scholarships and/or cash prizes Enjoy: A fun challenge Contestant Requirements: Basic understanding of Windows/Unix and the Internet Willingness to Learn Work as a Team Desire to Have Fun

Background Over 700 Competitors and 115 teams over the past 3 years 3 Divisions High School College Professional Team Sizes of 3-6 members Over $250,000 in student prizes awarded in the past 3 years Internships offered to student winners and runners-up Trophies, cash, and/or professional development prizes for professional team winner Competition finals run alongside 2 day conference Open to teams Nationwide!

Building a Team You can represent your organization or create a team with members from various organizations and companies Individual names will not be publicized nor will your company name (unless it s part of your team name) Your team name will be publicized. Only first and second place winners will be made public Team rankings will be given only to teams and not released publically Pictures will be taken at the event for use to market the event in the future Register soon! Team rosters will be locked on September 9 th Identify your captain. This will be the main communication point throughout the event.

Challenge Timeline Registration Closed September 9, 2014 Practice Round #1 (unscored) Windows August 12, 2014 Linux August 18, 2014 Forensics August 20, 2014 Practice Round #2 (unscored) Windows August 25, 2014 Linux August 27, 2014 Qualification Round 1 (Scored) - September 13-15, 2014 System Hardening for all competitors Qualification Round #2 (Scored) September 21-23, 2014 System Hardening for High School (different target) Forensics for College & Professionals Finals @ Baltimore Convention Center October 29 for College & Professionals October 30 for High School Online

Challenge Game Types System Hardening (Practice/Qualifications) Analyze Windows & Linux systems for vulnerabilities or potential vulnerabilities and secure systems that are vulnerable Forensics (College and Professional) Finding and reporting evidence of intrusions, discovery of malware, analysis of payloads, log analysis, network analysis, and tracking of attackers on images either of computer systems or USB drives. The more details reported to the White Team, the more points earned. Defense/CND (High School) Defending a network being attacked by a live Red Team, while maintaining critical services and securing hosts, detecting and mitigating Red Team activity and other misuse, and communicating findings. Attack/Defend Capture the Flag (College and Professional) Compromise and control targets, maintain control of targets, and secure your own targets against other teams attacks. The longer a team holds a target and maintains its critical services (i.e., Capture and Defend ), the more points earned.

Key Skills for Success System Hardening Windows & Linux System Administration knowledge Forensics Disk image analysis File carving Log file analysis Network traffic (Packet Capture) analysis Attack/Defend Capture the Flag Windows & Linux System Administration Log File Analysis Incident Response & Handling Intrusion Detection Teamwork, Organization, & Good communications skills are essential!

Helpful Hints During each round, you can download and work on as many VMs as you wish to make effective use of your team s time. However, only one VM may connect into CyberNEXS to represent your team for scoring purposes. Multiple logins from the same team may result in disqualification.

Cyber Maryland Conference October 29-30, 2014 @ Baltimore Convention Center Runs simultaneously with the Maryland Cyber Challenge Two Days of technical and non-technical conference sessions appealing to a wide range of audiences, industries, and expertise Exhibitor Fair Employer & Professional Networking Opportunities

Cyber Operations Key Skills Maintain critical services even during moments of intrusion and misuse Identify vulnerabilities and lock down systems (computers, network and security devices) Recognize and respond to hacker and computer misuse activity (Monitor and Forensics) Collect and Analyze Forensics Data Penetration Testing Communicate Effectively Realistically Train as you expect to Operate

CyberNEXS: The Environment Instruct Classroom Instruction Learning of facts Question and answers Instructor demonstrations Exercise Live Lab Reinforcement of learning Student hands-on Trail and error with real-time feedback Compete Game Measure individual or team Learn new techniques from others Fun; stimulus to learn more Certify Demonstrate Practical Knowledge Final verification of level of capability Certified under pressure

Qualification Round 1 Contestant Computer Requirements 2GB RAM 20GB Disk Space VMware Player (free) Internet Connectivity Requirements 64Kbps up/down link No latency requirements Characteristics For all Divisions 6 contiguous hours once connected to complete the round Prior to the round, contestant downloads VM target to their own machine. Decryption key sent 15 minutes prior to the start of the round Following system registration instructions is crucial! Contestant maintains critical services on own machine & conducts system hardening Agent sends status to CyberNEXS Global Services which returns score to Contestant s Status Page No attacks nor trouble ticket activity performed (no red/white team required) Practice Rounds 1 and 2 will prepare teams

Qualification Round 2 High School Contestant Computer Requirements 2GB RAM 20GB Disk Space VMware Player (free) Internet Connectivity Requirements 64Kbps up/down link No latency requirements Characteristics 6 contiguous hours once connected to complete the round Before the round, contestant downloads VM target to their own machine Decryption key sent 15 minutes prior to the start of the round Following system registration instructions is crucial! Contestant maintains critical services on own machine & conducts hardening. Agent sends status to CyberNEXS Global Services which returns score to Contestant s Status Page No attacks nor trouble ticket activity performed (no red/white team required) Practice Rounds 1 and 2 will prepare teams

Qualification Round 2 College & Professional Contestant Computer Requirements 2GB RAM 20GB Disk Space VMware Player (free) Internet Connectivity Requirements 64Kbps up/down link No latency requirements Characteristics 6 contiguous hours to complete during the round once connected Prior to the round, contestant downloads VM target and instructions to their own machine. Decryption key sent 15 minutes prior to the start of the round Following system registration instructions is crucial! Contestants conduct forensics analysis and report their findings to the White Team. Agent sends status to CyberNEXS Global Services which returns score to Contestant s Status Page Practice Round 3 will prepare teams

Finals (in-person) High School Teams log into their own CyberNEXS network Contestants harden systems in their network, maintain critical services and fill out trouble tickets, while Red Team attacks their network Contestant Computers will be supplied Understanding of Remote Desktop (Windows) and ssh (Linux) software is required along with system admin & security skills. No electronic media/devices Books & paper notes OK No staged internet sites or outside tools No coaching

Finals College and Professional Teams log into their own CyberNEXS network Contestants identify and compromise targets, then plant flags Contestants harden systems in their network, maintain critical services and protect their systems (and those they own by planting flags) while other teams try to attack Contestant Computers will be supplied Understanding of Remote Desktop (Windows) and ssh (Linux) software is required, along with system admin & security skills. No electronic media/devices Books & paper notes OK No staged internet sites or outside tools No coaching

Points of Contact Competition Director: Dr. Richard Forno (UMBC) Richard.forno@umbc.edu Competition Questions & GamePlay: Richard.forno@umbc.edu Competition Technical Support: CyberNEXS-HelpDesk@leidos.com CyberNEXS Program Manager: Susan Crowe Susan.m.crowe@leidos.com MDC3 Event Media/PR: Tia Howard Tia.m.howard@leidos.com Maryland Cyber Challenge Website