In the beginning, the idea of Cyber eX was fascinating and a little bit fantastic. Though, as Cyber eX (Cyber Exercise for Excellence) came true, we can all agree, it has the potential to become the next “big thing” in Philippine Army. Initially, Cyber eX (Cyber Exercise for Excellence) were made for entertainment and education purposes, with focus on Cybersecurity, hacking and many more about technologies.
Cyber Smorgasbord
The Cyber Smorgasbord offers ideas from which you can pick and choose what information you wanted to know about Cyber eX. It contains all the variety about Cyber eX (Cyber Exercise for Excellence).
Cyber Battlefield
The Cyber eX users will challenge to do Cyber Battlefield (CB) which they have to enhance their team and individual requirements as it allows the teams to play and generate challenging platforms to achieve the providing basic and advanced concepts of Cyber Exercise.
Capture The King
The Cyber eX users will challenge to Capture the King (CTK) which means answering all the cybersecurity scenarios over a period of time and they have to apply their skills and knowledge over technologies and hacking ideas.
Guide of OpenVPN Connect
This installation guide provides the steps to install OpenVPN Connect and connect to Access Server.
Cyber eX Scoreboard
The Cyber eX Scoreboard shows the result in all game category the Apprentice, Warrior and Conqueror.
Rank | Team | Battalion Unit/Office | Points | Country |
---|---|---|---|---|
No Solves Yet.. |
Rank | User | Full Name | Battalion Unit/Office | Points | Country |
---|---|---|---|---|---|
No Solves Yet.. |
Explore
This Cyber eX (Cyber Exercise for Excellence) provides a complete cybersecurity education. Through Cyber eX challenge category, you go from learning the fundamentals to mastering advanced techniques in cybersecurity. The cybersecurity experts used an exciting and well-paid role, which is open to anyone with the right skills. This Cyber eX challenge category makes us wanted to explore something new about technologies especially in cybersecurity. We live in the digital landscape where technology has surrounded us. The internet and mobile computing devices surround our professional and personal lives.