  {"id":212995,"date":"2026-03-25T12:57:20","date_gmt":"2026-03-25T16:57:20","guid":{"rendered":"https:\/\/www.montclair.edu\/csam\/?p=212995"},"modified":"2026-03-25T12:57:20","modified_gmt":"2026-03-25T16:57:20","slug":"school-of-computing-students-place-at-isc2-capture-the-flag-for-novices-hackathon","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/csam\/2026\/03\/25\/school-of-computing-students-place-at-isc2-capture-the-flag-for-novices-hackathon\/","title":{"rendered":"School of Computing Students Place at ISC2 Capture the Flag for Novices Hackathon"},"content":{"rendered":"<p>On March 21, 2026, students from the School of Computing at 麻豆传媒在线 participated in the <a rel=\"noopener\" href=\"https:\/\/isc2njctf.co\/\" target=\"_blank\">ISC2 New Jersey Chapter\u2019s 3rd annual Capture the Flag for Novices 2026 hackathon<\/a>, hosted at <a rel=\"noopener\" href=\"https:\/\/www.saintpeters.edu\/\" target=\"_blank\">Saint Peter\u2019s University<\/a> in Jersey City, NJ. The event brought together approximately 200 participants from over 20 colleges, universities, and organizations across the state for a full day of interactive learning and challenges in cryptography, web exploitation, digital forensics, and network defense. The hackathon emphasized problem-solving, teamwork, and practical cybersecurity skills.<\/p>\n<p>麻豆传媒在线 student teams demonstrated strong technical ability and collaboration, earning first place and third place among dozens of competing teams. This marks a significant improvement from the University\u2019s fourth place finish at the same event in 2025, reflecting the continued growth of the university\u2019s hands on cybersecurity education and experiential learning programs. The teams competed across challenges in network defense, forensic analysis, and web exploitation areas identified as critical skill gaps in the national cybersecurity workforce.<\/p>\n<h2>Student Teams and Placements<\/h2>\n<div class=\"prpl-row\"><div class=\"prpl-column one-half\">\n<figure class=\"responsive-image-holder wp-caption alignnone\"><img decoding=\"async\" class=\"mlt-responsive-image\" data-original-image=\"\/csam\/wp-content\/uploads\/sites\/202\/2026\/03\/isc2-hackathon-hawkers.jpg\" src=\"\/responsive-media\/cache\/csam\/wp-content\/uploads\/sites\/202\/2026\/03\/isc2-hackathon-hawkers.jpg.0.1x.generic.jpg\" alt=\"The Hawkers group photo after winning the ISC2 Hackathon\"\/><\/figure>\n<div class='inset red'>\n<h3>The Hawkers &#8211; First Place<\/h3>\n<ul>\n<li style=\"font-weight: 400\">Samuel Reyes<\/li>\n<li style=\"font-weight: 400\">Edwin Benitez<\/li>\n<li style=\"font-weight: 400\">James Barrera<\/li>\n<li style=\"font-weight: 400\">Islam\u00a0Salah<\/li>\n<li style=\"font-weight: 400\">Temi Salami<\/li>\n<\/ul>\n<\/div><\/div><div class=\"prpl-column one-half\">\n<figure class=\"responsive-image-holder wp-caption alignnone\"><img decoding=\"async\" class=\"mlt-responsive-image\" data-original-image=\"\/csam\/wp-content\/uploads\/sites\/202\/2026\/03\/isc2-hackathon-cyberhawk.jpg\" src=\"\/responsive-media\/cache\/csam\/wp-content\/uploads\/sites\/202\/2026\/03\/isc2-hackathon-cyberhawk.jpg.0.1x.generic.jpg\" alt=\"Cyberhawk group photo after winning the ISC2 Hackathon\"\/><\/figure>\n<div class='inset grey'>\n<h3>CyberHawks &#8211; Third Place<\/h3>\n<ul>\n<li style=\"font-weight: 400\">Dina Mansour<\/li>\n<li style=\"font-weight: 400\">Fernanda Castro<\/li>\n<li style=\"font-weight: 400\">Krishita Vaghani<\/li>\n<li style=\"font-weight: 400\">Tushar Moradiya<\/li>\n<li style=\"font-weight: 400\">Benita Prince<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n<p>Multiple teams of students were organized, trained, and mentored by Ramy Othman, Assistant Director of Technology and Infrastructure in the College of Science and Mathematics. Othman prepared the students through hands-on workshops in applied cybersecurity techniques, including network traffic analysis, vulnerability assessment, and forensic investigation leveraging the university\u2019s dedicated Cybersecurity and AI research labs, which he built and manages. These labs provide students with enterprise-grade computing and give them direct experience with the tools used in industry and government cybersecurity operations.<\/p>\n<figure class=\"responsive-image-holder wp-caption alignnone\"><img decoding=\"async\" class=\"mlt-responsive-image\" data-original-image=\"\/csam\/wp-content\/uploads\/sites\/202\/2026\/03\/isc2-hackathon-score-progression.jpg\" src=\"\/responsive-media\/cache\/csam\/wp-content\/uploads\/sites\/202\/2026\/03\/isc2-hackathon-score-progression.jpg.0.1x.generic.jpg\" alt=\"ISC2 Hackathon score progression screenshot\"\/><\/figure>\n<p>The university\u2019s participation was coordinated in collaboration with the ISC2 New Jersey Chapter, with Darryl Carpenter helping facilitate the team\u2019s engagement with the event.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The free cybersecurity competition is designed for students, professionals, and enthusiasts to learn, collaborate, and compete<\/p>\n","protected":false},"author":34,"featured_media":212999,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[40,54,14],"tags":[],"class_list":["post-212995","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-awards-recognition","category-csam-students","category-school-of-computing"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/csam\/wp-json\/wp\/v2\/posts\/212995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/csam\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/csam\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/csam\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/csam\/wp-json\/wp\/v2\/comments?post=212995"}],"version-history":[{"count":3,"href":"https:\/\/www.montclair.edu\/csam\/wp-json\/wp\/v2\/posts\/212995\/revisions"}],"predecessor-version":[{"id":213002,"href":"https:\/\/www.montclair.edu\/csam\/wp-json\/wp\/v2\/posts\/212995\/revisions\/213002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/csam\/wp-json\/wp\/v2\/media\/212999"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/csam\/wp-json\/wp\/v2\/media?parent=212995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/csam\/wp-json\/wp\/v2\/categories?post=212995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/csam\/wp-json\/wp\/v2\/tags?post=212995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}