Implement Zero Trust Electronic Voting (ZTEV) system
Break into a vulnerable server and retrieve the hidden data
Exploit the given web application and carry out various attacks covered in the program
Solve multiple Capture The Flag (CTF) Events and various security problems learned throughout the program.
*More details under the referral policy under Support Section
Only two simple steps to complete the enrollment process:
Fill out the application form with your academic and career details.
Reserve your seat by paying the block amount to enroll in the program.