{"id":3439,"date":"2022-05-30T09:28:40","date_gmt":"2022-05-30T08:28:40","guid":{"rendered":"https:\/\/www.dpscomputing.com\/blog\/?p=3439"},"modified":"2022-05-30T09:28:42","modified_gmt":"2022-05-30T08:28:42","slug":"cyber-centurion-challenge-round-1","status":"publish","type":"post","link":"https:\/\/www.dpscomputing.com\/blog\/2022\/05\/30\/cyber-centurion-challenge-round-1\/","title":{"rendered":"Cyber Centurion Challenge ROUND 1"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" data-attachment-id=\"3440\" data-permalink=\"https:\/\/www.dpscomputing.com\/blog\/2022\/05\/30\/cyber-centurion-challenge-round-1\/cyber-centurion-challenge-round-1\/\" data-orig-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Cyber-Centurion-Challenge-Round-1.jpg\" data-orig-size=\"1280,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Cyber Centurion Challenge TASTER Round\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Cyber-Centurion-Challenge-Round-1-300x169.jpg\" data-large-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Cyber-Centurion-Challenge-Round-1-1024x576.jpg\" tabindex=\"0\" role=\"button\" src=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Cyber-Centurion-Challenge-Round-1-1024x576.jpg\" alt=\"\" class=\"wp-image-3440\" srcset=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Cyber-Centurion-Challenge-Round-1-1024x576.jpg 1024w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Cyber-Centurion-Challenge-Round-1-300x169.jpg 300w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Cyber-Centurion-Challenge-Round-1-150x84.jpg 150w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Cyber-Centurion-Challenge-Round-1-768x432.jpg 768w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Cyber-Centurion-Challenge-Round-1.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p>Cyber Centurion is a challenge for 12-18 year olds based in the UK.  <\/p>\n\n\n\n<p>Take a look at our sneak preview at a <a href=\"https:\/\/cybergamesuk.com\/centurion\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Centurion Challenge TASTER round<\/a> to find out if you&#8217;d be interested in taking part in the real annual Cyber Centurion Challenge with a group of your friends.  You can each bring your own skillset to be able to work together and beat the challenges.  Who knows, it may be the start of an interesting cyber security career or a new hobby?<\/p>\n\n\n\n<p>Once you&#8217;re interested, make sure you sign up for the <a href=\"https:\/\/cybersecuritychallenge.org.uk\/what-we-do\/cybercenturion\" target=\"_blank\" rel=\"noreferrer noopener\">next annual competition<\/a> to put your cybersecurity skills to the test to see if you can take home the ultimate prize!<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"video-container\"><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/7zJkbwMIQ4M?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-GB&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span><\/div>\n<\/div><\/figure>\n\n\n\n<p>Can you complete this round faster than us?  Give it a go and let us know in the comments below!<\/p>\n\n\n\n<p>P.S. You might find this <a href=\"https:\/\/www.dcode.fr\/rot-cipher\" target=\"_blank\" rel=\"noreferrer noopener\">Rot17 tool<\/a> useful :).  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Centurion is a challenge for 12-18 year olds based in the UK. Take a look at our sneak preview at a Cyber Centurion Challenge TASTER round to find out if you&#8217;d be interested&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":3440,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Fancy yourself as an #EthicalHacker ?  Or maybe you just have an interest in #CyberSecurity ?\n\nSee if you can complete the challenges and watch our walkthrough of the process (just in case you get stuck!)\n\nFancy giving it a go?  There's a prize on offer!","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[367],"tags":[3107,3109,3108,3110,3111,1035,3113,3057,3112],"class_list":["post-3439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fun","tag-cyber-centurion","tag-cyber-centurion-2022","tag-cyber-centurion-challenge","tag-cyber-centurion-challenge-2022","tag-cyber-centurion-challenge-round","tag-cyber-security","tag-cyber-security-challenge","tag-cybersecurity","tag-cybersecurity-challenge"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Cyber-Centurion-Challenge-Round-1.jpg","jetpack_shortlink":"https:\/\/wp.me\/p3nsfA-Tt","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/3439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/comments?post=3439"}],"version-history":[{"count":1,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/3439\/revisions"}],"predecessor-version":[{"id":3441,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/3439\/revisions\/3441"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/media\/3440"}],"wp:attachment":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/media?parent=3439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/categories?post=3439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/tags?post=3439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}