{"id":321,"date":"2019-04-29T09:49:59","date_gmt":"2019-04-29T15:49:59","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=321"},"modified":"2021-08-30T13:07:42","modified_gmt":"2021-08-30T19:07:42","slug":"bellevue-teams-compete-in-national-cyber-league","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2019\/04\/29\/bellevue-teams-compete-in-national-cyber-league\/","title":{"rendered":"Bellevue teams compete in National Cyber League"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"358\" src=\"http:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/04\/NCL-Spring-1024x358.png\" alt=\"\" class=\"wp-image-322\" srcset=\"https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/04\/NCL-Spring-1024x358.png 1024w, https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/04\/NCL-Spring-300x105.png 300w, https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/04\/NCL-Spring-768x269.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>15 Bellevue University students participate in the spring season of the National Cyber League Capture the Flag competition.  Participating institutions fielded 627 teams to compete over a three day period to see who could solve the most challenges in the areas of:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Open Source Intelligence<\/li><li>Cryptography<\/li><li>Password Cracking<\/li><li>Log Analysis<\/li><li>Network Traffic Analysis<\/li><li>Wireless Access Exploitation<\/li><li>Scanning &amp; Recon<\/li><li>Web Application Exploitation<\/li><li>Enumeration and Exploitation<\/li><\/ul>\n\n\n\n<p>Bellevue fielded two teams with our top team placing in the top 10%<\/p>\n","protected":false},"excerpt":{"rendered":"<p>15 Bellevue University students participate in the spring season of the National Cyber League Capture the Flag competition. Participating institutions fielded 627 teams to compete over a three day period to see who could solve the most challenges in the areas of: Open Source Intelligence Cryptography Password Cracking Log Analysis Network Traffic Analysis Wireless Access [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[39],"tags":[],"class_list":["post-321","post","type-post","status-publish","format-standard","hentry","category-ctf"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/321\/revisions"}],"predecessor-version":[{"id":323,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/321\/revisions\/323"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}