Capture The King

Nowadays, cybersecurity makes headlines across the media and in companies, blogs, social networks, among other places. The Internet is a wild cyberspace, an arena for commercialization, consumerism, business, and leisure, to name a few activities. Networks, populations, and nations around the world, now interconnected through the Internet, rely on it for their daily lives. But some Internet users have learned to take advantage of vulnerable systems and of Internet technologies for their own good, sending out spam, phishing, data breaches, botnets, and other threats. An underground criminal network has emerged, creating complex malware kits for several purposes.

The Philippine Army, in compliance with the PA Medium-Term Force Structure 2012 -2021, made efforts to plan, develop and organize the activation of the Cyber Battalion, Army Signal Regiment. This is also in compliance on the provisions of the adoption of cyberspace as another domain of operations and the PA Operating Concept.

As the Philippine Army’s dependence on networks has increased, the organization relied heavily on jointly defending cyberspace.

In order to enforce cybersecurity practical exercises cost-effectively and flexibility, Cyber Battalion developed the next generation cyber exercise training platform of the Philippine Army which simulates cyber combat training. This is designed to provide comprehensive hands-on training for Philippine Army personnel to train and improve responsive capacity in case of a cyber crisis.

The structure and program of the cyber exercise are similar across operations; however, the execution and scenarios vary depending on the participants and objectives of a specific exercise. Understanding the different types of exercises and the intent that each fulfills greatly increases exercise realism and effectiveness. Once the operations establish exercise objectives, the exercise users can begin to take a more detailed look at what type of exercise would match the objectives and provide an effective assessment for the team platform programs.

Cyber eX’s main feature is Capture the King (CTK). The system provides complete and customized cybersecurity learning and has a unique feature gaming platform that have different cyber scenarios from beginners to experts. CTK has different categories namely - Apprentice, Warrior and Conqueror where each category has a level of difficulty and have prerequisite. Each team should finish at least 70% of apprentice to unlock the Warrior Category, and to unlock the Conqueror Category, the team must answer at least 60% of Warrior Category challenges. Individual exercises has chronicles features to upload the documents on how each team solved the challenge where the team will gain additional score for this documentation. Counter measure features the best practices in solving the challenge. Additional points will also be given on this documentation. Capture the King has the facility to accommodate the immediate concerns of the user or team using Cyber eX Live Chat Support. CTK admins will address questions or concerns thru this feature.

The user or team need to face the latest vulnerabilities, exploits and threats, Trojan horse malware, ransomware, scatter infiltration brute force attacks and data tampering to test your cyber skills, learn cutting edge techniques and solve real life scenarios.

Join the challenge and empower your cyber skills!