September 25, 2018

UAT Cyber Security Degree Students Participate in November WRCCDC Invitational

WRCCDC Invitational

The November Western Regional Collegiate Cyber Defense Competition (WRCCDC) Invitational was held Saturday, November 7, from 10:30 a.m. – 4:30 p.m. UAT had eight Cyber Security Degree/Network Security Degree students complete, seven of them participating for the first time.

The WRCCDC Invitational is a virtual competition that UAT Cyber Security Degree students were able to attend right from UAT’s Cyber Cave on campus. Here’s what six hours of determination looks like! It actually looks like these guys had fun, too.

Network Security Faculty Advisor Al Kelly said, “They were great at keeping services up, but need to work on Injects and Red Team Attack responses,” all important skills for finding employment with top security agencies after graduation.

The Next WRCCDC Invitational will be in December, so they have just over a month to practice.

Cyber Security Degree students that competed this Saturday.

  • Daniel Howell
  • Garrett Elkins
  • William Peterson
  • Edward Sanchez
  • Arthur Miramontes
  • David Savlowitz
  • Andrew Danis
  • Roger Brambila

Great work students!

About Western Regional Collegiate Cyber Defense Competition:

The Collegiate Cyber Defense Competition (CCDC) system is to provide a controlled, competitive environment for institutions with an information assurance or computer security curriculum to assess their student’s depth of understanding and operational competency in managing the challenges inherent in protecting a corporate network infrastructure and business information systems.

CCDC competitions ask student teams to assume administrative and protective duties for an existing “commercial” network – typically a small company with 50+ users, 7 to 10 servers, and common Internet services such as a web server, a mail server, and an e-commerce site.

Each team begins the competition with an identical set of hardware and software for their fictitious business and teams are scored on their ability to detect and respond to outside threats, maintain availability of existing services such as mail servers and web servers, respond to business requests such as the addition or removal of additional services, and balance security needs against business needs.

Throughout the competition an automated scoring engine is used to verify the functionality and availability of each team’s services on a periodic basis while traffic generators continuously feed simulated user traffic into the competition network. A volunteer red team provides the “external threat” that all Internet-based services face and allows the teams to match their defensive skills against live opponents.


Leave A Comment