C-ST&R Program

C-ST&R
Program

The Cyber-Security Training & Readiness (C-ST&R) Program is an innovative initiative designed to discover and nurture emerging cybersecurity talent. It focuses on equipping selected UD students with critical skills and real-world expertise, helping them excel in the fast-evolving field of cybersecurity.

Terms & Conditions:

1.Eligibility

The program is open exclusively to currently registered University of Dubai (UD) students. Alumni are not eligible to participate.

2. Inclusion Criteria

All UD students, regardless of their college affiliation, are eligible to join, including both undergraduate and postgraduate students.

3. Enrollment Requirement

To enroll in the program, students must extract a key from the designated challenges and submit it through the registration form. Each student may register only one key, and the key must not have been previously used by any other participant.

4. Re-enrollment Restriction

Students who have successfully completed the program in previous semesters are not eligible to enroll again.

5. Attendance and Participation

Enrolled students must attend a minimum of three out of five workshops, including the pre-workshop.

Additionally, participation in both the indoor and outdoor competitions at the end of the program is mandatory.

Registration will open Fall 2025-2026

Remaining
0 Days
0 Hours
0 Minutes
0 Seconds

Challenges

2025

Batch Period: Sep 29, 2025 9:06 AM - Oct 6, 2025 12:06 PM

Registration is currently closed for this batch.

Please check back later or contact administration for more information.

Registration Deadline
0 Days
0 Hours
0 Minutes
0 Seconds
By participating in one of the challenges, you agree to the terms and conditions...
After the student extracts the key, they must convert it into an MD5 hash value and compare it to the key table.

Web Exploitation

Reverse Engineering

Cryptography

Stegno analysis

Key Table - 2025

Challenge Title MD5 Hash Of Keys Status
Web Exploitation5565c8cfb763bb6f07c994abf02f2245✅ Solved
Web Exploitation10823d18e011e9f613a662c13f1336c9✅ Solved
Web Exploitationbd66c702c28bf081a7a5fd79e20bd6eb✅ Solved
Reverse Engineeringa69e5033ca86009eb69550d8381250d6✅ Solved
Reverse Engineering84cb1ebf6c4a047b93e30a5d4fe460b3✅ Solved
Reverse Engineeringa111e5eb4c2a0dac66120372c2a1f12b✅ Solved
Cryptographyd5629da9563b7b554929de5f62cafd96✅ Solved
Cryptography5a8cd0e86c2088066e6157091d756d82✅ Solved
Cryptographye202d2705b3ed4794860324e4d164079✅ Solved
Stegno analysis06b0fc755ddf93e2803b5547007953ae✅ Solved
Stegno analysis24088b52c65030583942b91aff9af6e3✅ Solved
Stegno analysis6294569a92408453501b7562235d5449✅ Solved

12

Solved Keys

0

Remaining Keys

12

Total Keys

100%

Completion Rate

Pioneering cutting-edge research and technological advancements to lay the foundational groundwork for a secure and resilient digital landscape of the future hyper-connected society.

© 2024  University of Dubai

Contacts