  {"id":319,"date":"2024-10-07T14:51:15","date_gmt":"2024-10-07T19:51:15","guid":{"rendered":"https:\/\/uwm.edu\/csi\/?page_id=319"},"modified":"2024-12-16T10:02:49","modified_gmt":"2024-12-16T16:02:49","slug":"cybersecurity-challenge","status":"publish","type":"page","link":"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/","title":{"rendered":"Cybersecurity: Attack and Defend Challenge"},"content":{"rendered":"\n<div class=\"uwm-l-row\">\n<div class=\"uwm-l-col\">\n<figure><img loading=\"lazy\" decoding=\"async\" width=\"263\" height=\"30\" src=\"https:\/\/uwm.edu\/csi\/wp-content\/uploads\/sites\/708\/2024\/10\/Fortinet.png\" alt=\"Fortinet Logo\" class=\"wp-image-215\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-join-us-for-a-capture-the-flag-challenge\">Join us for a Capture-the-Flag Challenge<\/h2>\n\n\n\n<h3 class=\"wp-block-heading uwm-u-mt-0\" id=\"h-connected-systems-institute-september-20-2024-9-30-a-m-3-30-p-m\">Connected Systems Institute | September 20, 2024 | 9:30 a.m. &#8211; 3:30 p.m.<\/h3>\n\n\n\n<p>You will have a chance to dive into real-world attack scenarios and Fortinet defense strategies to mitigate those attacks.<\/p>\n\n\n\n<p>To protect an organization, it is key to understand how it can be breached. At this event, participants will learn what tools and methodologies threat actors use to breach an organization. The participants will play the role of the threat actor and explore the anatomy of an attack to see how easy it is to penetrate an organization.<\/p>\n\n\n\n<p>Once breached, participants will then go on to deploy and configure different products to understand exactly how these solutions can break the kill chain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-agenda\">Agenda<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>9:30 am &#8211; Attack Starts<\/li>\n\n\n\n<li>12:00 pm &#8211; Working Lunch<\/li>\n\n\n\n<li>1:00 pm &#8211; Defend Starts<\/li>\n\n\n\n<li>3:30 pm &#8211; Competition Ends, Prizes Awarded<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Participate as a Team of Two<\/strong><\/h2>\n\n\n\n<p>Please register individually and include your team\u2019s name. If you want to participate but do not have a teammate, go ahead and register, and we will team you up with someone else who is on their own at the event.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Audience:<\/strong> 51ÁÔÆæ students (grad or undergrad)<\/li>\n\n\n\n<li><strong>When:<\/strong> Friday, September 20, 2024<\/li>\n\n\n\n<li><strong>Time:<\/strong> 9:30 a.m. \u2013 3:30 p.m., Lunch Included<\/li>\n\n\n\n<li><strong>Location:<\/strong> Connected Systems Institute, GML E190<\/li>\n\n\n\n<li><strong>Cost:<\/strong> Free!<\/li>\n<\/ul>\n\n\n\n<p><strong>Note:<\/strong> Attendees must bring their own laptop.<\/p>\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-l-col--4 uwm-l-offset--1\">\n<div class=\"uwm-l-buttons--full\">\n<a class=\"uwm-c-button uwm-c-button--full uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/ad-challenge-registration\/\" rel=\"\">Register Now<\/a>\n<\/div>\n\n\n\n<div class=\"uwm-p-card uwm-p-card--color-head uwm-u-mb-40\"><div class=\"uwm-p-card--title\">Contact<\/div><div class=\"uwm-p-card--body\"><div class=\"uwm-p-card--content\">\n<p>For cancellations or inquiries, please email <a href=\"mailto:caseyo@uwm.edu\">caseyo@uwm.edu<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1287,"featured_media":0,"parent":459,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"templates\/centered.php","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"class_list":["post-319","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Connected Systems Institute<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: Attack and Defend Challenge\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/\" \/>\n<meta property=\"og:site_name\" content=\"Connected Systems Institute\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-16T16:02:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uwm.edu\/csi\/wp-content\/uploads\/sites\/708\/2024\/10\/Fortinet.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/workforce-innovation\\\/workshops\\\/cybersecurity-challenge\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/workforce-innovation\\\/workshops\\\/cybersecurity-challenge\\\/\",\"name\":\"Cybersecurity: Attack and Defend Challenge - Connected Systems Institute\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/workforce-innovation\\\/workshops\\\/cybersecurity-challenge\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/workforce-innovation\\\/workshops\\\/cybersecurity-challenge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/wp-content\\\/uploads\\\/sites\\\/708\\\/2024\\\/10\\\/Fortinet.png\",\"datePublished\":\"2024-10-07T19:51:15+00:00\",\"dateModified\":\"2024-12-16T16:02:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/workforce-innovation\\\/workshops\\\/cybersecurity-challenge\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/csi\\\/workforce-innovation\\\/workshops\\\/cybersecurity-challenge\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/workforce-innovation\\\/workshops\\\/cybersecurity-challenge\\\/#primaryimage\",\"url\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/wp-content\\\/uploads\\\/sites\\\/708\\\/2024\\\/10\\\/Fortinet.png\",\"contentUrl\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/wp-content\\\/uploads\\\/sites\\\/708\\\/2024\\\/10\\\/Fortinet.png\",\"width\":263,\"height\":30,\"caption\":\"Fortinet Logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/workforce-innovation\\\/workshops\\\/cybersecurity-challenge\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Workforce Innovation\",\"item\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/workforce-innovation\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Workshops &amp; Opportunities\",\"item\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/workforce-innovation\\\/workshops\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity: Attack and Defend Challenge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/\",\"name\":\"Connected Systems Institute\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/#organization\",\"name\":\"University of Wisconsin - Milwaukee\",\"url\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/wp-content\\\/uploads\\\/sites\\\/708\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/wp-content\\\/uploads\\\/sites\\\/708\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"width\":225,\"height\":224,\"caption\":\"University of Wisconsin - Milwaukee\"},\"image\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Connected Systems Institute","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity: Attack and Defend Challenge","og_url":"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/","og_site_name":"Connected Systems Institute","article_modified_time":"2024-12-16T16:02:49+00:00","og_image":[{"url":"https:\/\/uwm.edu\/csi\/wp-content\/uploads\/sites\/708\/2024\/10\/Fortinet.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/","url":"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/","name":"Cybersecurity: Attack and Defend Challenge - Connected Systems Institute","isPartOf":{"@id":"https:\/\/uwm.edu\/csi\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/#primaryimage"},"image":{"@id":"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/#primaryimage"},"thumbnailUrl":"https:\/\/uwm.edu\/csi\/wp-content\/uploads\/sites\/708\/2024\/10\/Fortinet.png","datePublished":"2024-10-07T19:51:15+00:00","dateModified":"2024-12-16T16:02:49+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/#primaryimage","url":"https:\/\/uwm.edu\/csi\/wp-content\/uploads\/sites\/708\/2024\/10\/Fortinet.png","contentUrl":"https:\/\/uwm.edu\/csi\/wp-content\/uploads\/sites\/708\/2024\/10\/Fortinet.png","width":263,"height":30,"caption":"Fortinet Logo"},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/cybersecurity-challenge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/csi\/"},{"@type":"ListItem","position":2,"name":"Workforce Innovation","item":"https:\/\/uwm.edu\/csi\/workforce-innovation\/"},{"@type":"ListItem","position":3,"name":"Workshops &amp; Opportunities","item":"https:\/\/uwm.edu\/csi\/workforce-innovation\/workshops\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity: Attack and Defend Challenge"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/csi\/#website","url":"https:\/\/uwm.edu\/csi\/","name":"Connected Systems Institute","description":"","publisher":{"@id":"https:\/\/uwm.edu\/csi\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/csi\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uwm.edu\/csi\/#organization","name":"University of Wisconsin - Milwaukee","url":"https:\/\/uwm.edu\/csi\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uwm.edu\/csi\/#\/schema\/logo\/image\/","url":"https:\/\/uwm.edu\/csi\/wp-content\/uploads\/sites\/708\/2020\/11\/uwm-seo-logo.jpg","contentUrl":"https:\/\/uwm.edu\/csi\/wp-content\/uploads\/sites\/708\/2020\/11\/uwm-seo-logo.jpg","width":225,"height":224,"caption":"University of Wisconsin - Milwaukee"},"image":{"@id":"https:\/\/uwm.edu\/csi\/#\/schema\/logo\/image\/"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/pages\/319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/users\/1287"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/comments?post=319"}],"version-history":[{"count":11,"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/pages\/319\/revisions"}],"predecessor-version":[{"id":3377,"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/pages\/319\/revisions\/3377"}],"up":[{"embeddable":true,"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/pages\/459"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/media?parent=319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}