April 19, 2013
/PRNewswire-USNewswire/ -- Students from 10 colleges across the nation will gather in
this weekend to spar for the Alamo Cup, awarded to the champions of the National Collegiate Cyber Defense Competition. The three-day national championship, hosted by the UTSA Center for Infrastructure Assurance and Security and now in its eighth year, is
at the St. Anthony Hotel.
The practical competition, the only one of its type in the country for college students, is modeled from real scenarios and obstacles and serves as a training ground for future cyber defenders. Through the competition, challengers are given an opportunity to shine on a national stage and connect with the nation's top cyber security firms.
"Competitions are an excellent way for students to develop skills that compliment classroom-based education. CCDC events help students build technical skills and soft skills. These events teach them to work as part of a team under challenging circumstances. The CCDC helps to develop a better equipped cyber workforce which is one of the reasons it has become such a fertile recruiting ground for both government and industry," said
, director of the NCCDC.
This year's championship competitors include:
- University of Alaska, Fairbanks , At-Large Regional CCDC Winner
- Millersville University ( Penn.), Mid-Atlantic Regional Winner
- Rose-Hulman Institute of Technology (Ind.), Mid-West Regional Winner
- Dakota State University (S.D.), North Central Regional Winner
- Rochester Institute of Technology , Northeast Regional Winner
- University of Washington , Pacific Rim Regional Winner
- United States Air Force Academy , Rocky Mountain Regional Winner
- University of Central Florida , Southeast Regional Winner
- Oklahoma State University , Southwest Regional Winner
- California State Polytechnic University, Pomona , Western Regional CCDC Winner
The NCCDC is designed to test how well students operate and manage a network infrastructure, similar to the networks found in the commercial sector. At the start of the competition, each team will inherit an "operational" network from a fictional business that includes e-mail, websites, data files and users. The competitors are given minimal information about the network, its security levels and its software. After familiarizing themselves with their networks for a few frantic minutes, a live Red Team starts actively scanning and probing their companies.