{"id":2304,"date":"2025-01-31T09:37:00","date_gmt":"2025-01-31T15:37:00","guid":{"rendered":"https:\/\/cybersecurity.bellevue.edu\/?p=2304"},"modified":"2025-01-31T09:39:03","modified_gmt":"2025-01-31T15:39:03","slug":"national-cyber-league-spring-sign-up","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2025\/01\/31\/national-cyber-league-spring-sign-up\/","title":{"rendered":"National Cyber League Spring Registration"},"content":{"rendered":"\n<p>Interested in increasing your cyber skills in a fun, competitive environment with your classmates as well as universities from across the nation? If so consider joining our National Cyber League (NCL) Team. The NCL competition is called a capture the flag as you are using various cybersecurity skills to find \u2018flags\u2019 or hidden items of information.&nbsp; The challenges may have to do with open source intelligence, scanning, enumeration and exploitation, log and traffic analysis, wireless security, cryptography, forensics, and web application security.&nbsp; Prior experience is not a necessity and in fact this is a great way to bring together many of the aspects of what you have learned through the program.&nbsp; There will be an individual practice game and an individual and team orientated competitions.&nbsp; You can participate online regardless of your location.&nbsp; You should plan on committing several hours a week (at least 4-8) to competing and training. Competitions usually go over a weekend and are done as an open time block.&nbsp; You need to be able to put in at least 6-8 hours of time during that block (plan on dedicating a day or more for a competition). You can find out more about the league here&nbsp;<a href=\"https:\/\/www.nationalcyberleague.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.nationalcyberleague.org<\/a>&nbsp;<\/p>\n\n\n\n<p>The practice gym is open now so you can start training and we will start video meet-ups soon. Our practice game starts on March 31st and runs for one week to give you a chance to try out the various challenges. The individual game runs April 11<sup>th<\/sup> \u2013 13th and the team game is April 25 \u2013 27.<\/p>\n\n\n\n<p>The College of Science and Technology will pay for registration of a limited number of players so if you are&nbsp;interested&nbsp;and ready to dedicate some time contact Professor Rausch,&nbsp;<a href=\"mailto:drausch@bellevue.edu\">drausch@bellevue.edu<\/a>&nbsp;if you have further questions or register here: &nbsp;<a href=\"https:\/\/forms.office.com\/r\/rEnR6Kuju0\">https:\/\/forms.office.com\/r\/rEnR6Kuju0<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Interested in increasing your cyber skills in a fun, competitive environment with your classmates as well as universities from across the nation? If so consider joining our National Cyber League (NCL) Team. The NCL competition is called a capture the flag as you are using various cybersecurity skills to find \u2018flags\u2019 or hidden items of [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[39],"tags":[],"class_list":["post-2304","post","type-post","status-publish","format-standard","hentry","category-ctf"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/2304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=2304"}],"version-history":[{"count":3,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/2304\/revisions"}],"predecessor-version":[{"id":2308,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/2304\/revisions\/2308"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=2304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=2304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=2304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}