Case Study
The Inter-Services Cyber Network Defence Challenge
Day 1 - Four r ounds of t ec hni c al c hal l enges f eat ur i ng def ens i ve s ki l l s , mal war e det ec t i on and pr event i on, penet r at i on t es t i ng and I nc i dent r es pons e – wher e t eams ar e c hal l enged on how bes t t o as s es s and i dent i f y poi nt s of c ompr omi s e and weaknes s Day 2 – Whet her i t ’ s t es t i ng t hei r knowl edge t hr ough t he s ui t e of t ool s i n t he Kal i Li nux envi r onment , per f or mi ng enc odi ng, dec odi ng, enc r ypt i on and dec r ypt i on t o s ol ve c r ypt ogr aphi c puz z l es , per f or mi ng pos t br eac h c l ean ups or i dent i f yi ng and s ec ur i ng vul ner abi l i t i es , t he t eams i ndi vi dual and c ol l ec t i ve s ki l l s ar e t es t ed t o t he max vul ner abi l i t i es , t he t eams i ndi vi du