National Security Agency and Central Security Service logos

Welcome to the 2019 Codebreaker Challenge!

To get started, register for an account using your email address. Then, visit the Challenge page.

OVERVIEW

The 2019 Codebreaker Challenge consists of a series of tasks that are worth a varying amount of points based upon their difficulty. All tasks will become available immediately once the Challenge goes live and can be solved in any order, though there may be some dependencies between tasks. The point value associated with each task is based on relative difficulty and schools will be ranked according to the total number of points accumulated by their students. It is still recommended to solve tasks in order since the tasks flow with the storyline, but that is not a requirement. Solutions may be submitted at any time for the duration of the Challenge. Good luck!

BACKGROUND

DISCLAIMER - The following is a FICTITIOUS story meant for providing realistic context for the Codebreaker Challenge and is not tied in any way to actual events.

Tech savvy terrorists have developed a new suite of communication tools to use for attack planning purposes. Their most recent creation — TerrorTime — is a secure mobile chat application that runs on Android devices. This program is of particular interest since recent intelligence suggests the majority of their communications are happening via this app. Your mission is to reverse-engineer and develop new exploitation capabilities to help discover and thwart future attacks before they happen. There are 7 tasks of increasing difficulty that you will be working through as part of this challenge. Ultimately, you will be developing capabilities that will enable the following:

  1. Spoof TerrorTime messages
  2. Masquerade (i.e., authenticate) as TerrorTime users without knowledge of their credentials
  3. Decrypt TerrorTime chat messages

NICE Challenge Project

We bring students the workforce experience before the workforce.

The NICE Challenge Project develops real-world cybersecurity challenges within virtualized business environments that bring students the workforce experience before the workforce. Our goal is to provide the most realistic experiences to students, at-scale year-round, while also generating useful assessment data about their knowledge, skills, and abilities for educators.

What is a NICE Challenge?

Each NICE Challenge has the following core elements: a narrative-driven scenario, a business environment (workspace), and a set of technical objectives and/or a written deliverable. Each of these elements is developed to immerse the player (student) in a real-world experience and create a valuable set of data allowing their curator (educator) to judge their readiness for the workforce.

There are currently two different types of NICE Challenges, technical and hybrid, which focus on different parts of the cybersecurity workforce.

Man sitting at latop
Whether looking for information on programs, admissions, or financial aid, we're here to help.
Whether looking for information on programs, admissions, or financial aid, we're here to help.
Talk to your personal enrollment advisor for more information today. Please use our International Form if you live outside of the U.S.
Talk to your personal enrollment advisor for more information today. Please use our Domestic Form if you live in the U.S.
*Required Field
Academic Interests
Required
Required
Are you or your spouse an active or retired U.S. military service member?
Contact Information
Required
Required
Invalid email address
Please provide a valid phone number
Required
Please provide a valid zipcode
Required
Additional Information
Required
Get Started

By submitting this form, I agree to receive emails, text messages, telephone calls, and prerecorded messages from or on behalf of Walden University and its affiliates as listed in the Privacy Policy regarding furthering my education. I understand that such calls, emails, and messages may be sent using automated technology. You may opt out at any time. Please view our Privacy Policy or Contact Us for more details.

Required

By checking this box, I agree to receive emails, text messages, telephone calls, and prerecorded messages from or on behalf of Walden University and its affiliates as listed in the Privacy Policy regarding furthering my education. I understand that such calls, emails, and messages may be sent using automated technology. You may opt out at any time. Please view our Privacy Policy or Contact Us for more details.