Suspendisse interdum consectetur libero id. Fermentum leo vel orci porta non. Euismod viverra nibh cras pulvinar suspen.

Home Olympiads NJCO 2025

National Junior Cybersecurity Olympiad

(Free Learning Videos for NUS, Singapore)
Registration Last Date 18th September 2025
Exam Date 28th september 2025 Online

Overview

National Junior Informatics Olympiad (NJIO) an innovative approach designed to spark students’ interest in programming by leveraging the principles of computational thinking and block programming. This statement explains how NJIO accomplishes this goal by breaking down complex problems into manageable parts, fostering an engaging and accessible learning environment.

Objective

Popularize the field of cybersecurity among high school and university students, organize additional training in cybersecurity to enhance students’ knowledge and interest in a possible future profession, and stimulate the desire to study additional technology and cybersecurity topics.

Who is NJCO for?
The NJCO is designed for students in grades 8 through 12 and first and second-year undergraduates. The course and the exam will be the same for all students, although the classifcation will take place within each grade.

Format Of The Course

The NJCO course features 4 pre-recorded online video lessons, each 2 hours long, totaling 8 hours of content, tailored specifcally for high school and university students. Designed by the National Cybersecurity R&D Lab (NCL) and the Centre for Nurturing Computing Excellence (CeNCE), both hosted at the School of Computing, NUS, the course allows students to engage with the material at their own pace. This flexible learning format ensures that students can pause, rewind, and revisit lessons any time and from anywhere, maximizing their understanding of the various topics outlined in the syllabus.

Format Of The Test

The NJCO contest, taken after the workshop that precedes it, will consist of 40 multiple-choice questions divided into 10 questions for each topic presented in the Syllabus. Each correct answer will be awarded 2.5 points, and no points will be deducted for blank or incorrect answers.

Awards

The awards will adhere to CenCE’s classifcation criteria, followed by the NOI. Accordingly, let be the total number of participants in the NJCO competition.

Based on the ranking and scores of these participants, the following proportions will determine the distribution of awards:

  • Gold Medals: about 1/12 of the contestants in each grade (Top 8.3%).
  • Silver Medals: about 1/6 of the contestants in each grade (Next 16.7%).
  • Bronze Medals: about 1/4 of the contestants in each grade (Next 25%).

Syllabus

  • Topic 1: Cryptography

    This topic introduces Cryptography, including encryption, hash techniques, pitfalls, and its historical context. These concepts are of fundamental importance in laying the foundations of cybersecurity. Students will learn and experience adversarial thinking through examples, understand what cryptography can achieve, and become familiar with some common types of cryptography and its intriguing techniques.

  • Topic 2: Networking Fundamentals

    This topic introduces adversarial thinking in networks, network discovery through the Wireshark tool, and the Era of Digitalization. Students will also learn how to trace the network journey from the URL to a webpage, gaining an overview of the source page and exploring the functionalities of the Wireshark network tool.

  • Topic 3: Red Teaming & Introduction to CTFs

    This topic introduces the fundamental concepts of Capture the Flag (CTF) competitions and their many categories. In addition, students will become familiar with Linux operating systems, including basic commands, file permissions and processing, and how to install software and tools in a Linux environment. Furthermore, students will explore the programming languages commonly used to solve CTF challenges, supplemented with practical CTF demonstrations.

  • Topic 4: Digital Forensics

    This topic introduces Digital Forensics, covering the main stages of the digital forensics process, such as the identification, preservation, collection, examination, analysis, and presentation of digital evidence. Students will explore various types of digital evidence, such as Network Traffic Logs, Memory Dumps, Data Imaging, and File System Artifacts. Additionally, students will become familiar with the tools commonly used in forensic investigations. Hands-on exercises will provide practical experience in the application of forensic techniques and tools in real-world scenarios.

Instructor

  • (5) Reviewed on Jun 6, 2025 5k Students 08 Course
Rs. 2200/-
3 Days Left
Add To Cart Add To Cart Buy Now Buy Now

30-Day Money Back Guarantee

Apply Coupon
RT260875G1 is applied Educuet Coupon

For Details About The Course

Call Us: 7972621561

Related Courses

10,000+ unique online course list designs
Design
$20.00 $9.00
Design Thinking Researching for Better UX
(4.7/5 Customer Rating)
20 Lessons 50 Sutudents
Marketing
$20.00 $9.00
Discover Highly Rated Learning Programs
(4.7/5 Customer Rating)
20 Lessons 50 Sutudents
Design
$20.00 $9.00
Design Thinking Researching for Better UX
(4.7/5 Customer Rating)
20 Lessons 50 Sutudents
Marketing
$20.00 $9.00
Discover Highly Rated Learning Programs
(4.7/5 Customer Rating)
20 Lessons 50 Sutudents

Sign Up today to get the
latest inspiration & insights