TCS HackQuest Season 9

TCS HackQuest Season 9

Overview

Organizations face more security concerns as a result of technological improvements and a greater emphasis on digital. Hacking has become more organized and widespread, with cybercriminals employing a variety of tactics to obtain unauthorized access, steal confidential data, or interfere with digital processes. A large ethical hacking community has become essential in the post-pandemic era, necessitating the use of cyber sentinels to protect decentralized systems. This particular area of study ought to have a comprehensive grasp of the ways in which data is transferred, stored, and used throughout the digital environment.

The Contest

In order to find talented players that excel in their favorite game, Catch the Flag, HackQuest was founded in 2016. The competition features tasks that must be finished in six hours and is based on the well-known “Catch the Flag” (CTF) format. Three categories—beginner, intermediate, and expert—will be used to deliver the collection of problems. Participants can select challenges from a variety of categories, and they are urged to try every challenge in every category and show that they can manage a range of situations. Ultimately, associates receive unique awards and possibly even employment offers from TCS in the cybersecurity division.

Deloitte National Level Assessment 2 Registration started

Qualifications

  • Students who are enrolled in any accredited college, university, or academic institution in India and who will graduate in the academic year 2025 with any of the following degrees in any specialization are eligible to enter the contest:
  • Technology Bachelor’s Degree (B. Tech)
  • Engineering bachelor’s degree (B.E.)
  • Technology Master (M. Tech)
  • Engineering Master’s degree (M.E.)
  • Computer Applications Bachelor (B.C.A.)
  • Computer Applications Master (M.C.A.)
  • Science Bachelor (B.Sc. – B.S.)
  • Science Master (M.Sc. – M.S.)

Participants

Only individuals are permitted to enter the competition. Participation by teams or groups is not permitted.
At any time throughout the contest’s validity, TCS retains the right to evaluate each participant’s eligibility and adherence to the rules. At TCS’s request, participants must reply right away with any supporting documentation needed to confirm their eligibility and/or compliance. TCS retains the right to deny admission to any participant and is under no obligation to give a reason.
There are no fees associated with participation, registration, submission, or contests. However, it is the individual’s responsibility to cover any costs that may arise from their participation in the event. Such costs will not be sponsored or reimbursed by TCS.

Registration

  • Participants must need a valid TCS NextStep reference ID (CT/DT number) to register for the contest on the website (https://www.hackquest.tcsapps.com) as soon as the registration window opens.
  • Participants must log in to TCS NextStep (https://nextstep.tcs.com/campus/) in the “IT” section (not BPS), complete the necessary fields, and submit in order to generate a valid TCS NextStep reference ID (CT/DT number). A pop-up window containing the TCS NextStep reference ID (CT/DT number) will be shown to the participant. To enter the contest, you must have a TCS NextStep reference ID (CT/DT number).
  • The participant will obtain a special credential to participate in the contest in addition to the TCS NextStep reference ID (CT/DT number) established through TCS Next Step. It is extremely important that this credential not be disclosed to any other participants.
  • Participants who are interested in the contest will register on the website and provide the required profile information.

Structure

  • here will be two rounds to the competition. All participants are welcome to participate in the first round, often known as “Round 1,” which is an online “Catch the Flag” tournament. Those who qualify will be shortlisted for the following rounds.
  • After Round 1, those who made the short list advance to Round 2, which will be held via Microsoft TEAMS/Webex and require participants to keep their cameras turned “ON” the entire time. This is at the company’s choice and could alter based on its strategy. Participants should be prepared to physically attend the event if necessary. TCS will cover the cost of the trip.
  • TCS will provide for remote evaluation of a selected list of Round 1 candidates. Shortlisted participants must stay tuned for real-time details on Round 2, including dates and formats. Participants are solely responsible for keeping track of the announcements and responding accordingly.

Johnson Controls Biggest Freshers Hiring for Associate Software Engineer

Round 1

  • This will be an online challenge-based test in which participants must log into an online application and complete a series of challenge statements. These examinations will demand candidates to demonstrate both ethical hacking skills and particular proficiency in security problems. The collection of challenge statements will be offered in three (3) categories:
  • Beginner-level challenges: This category of challenges was methodically designed for folks with little to no prior expertise. These challenges will be focused on the fundamentals of cybersecurity, including knowledge of fundamental tools and methodologies. Challenges focus on fundamental ideas such as (but not limited to) password cracking, simple encryption, and basic network vulnerabilities.
  • Challenges at the intermediate level: These tasks are intended to assess your capacity for creative thought and problem-solving. You will need to prove that you understand cutting-edge cybersecurity techniques and tools as you work through these problems. The challenges cover more complex subjects, including but not limited to network analysis, SQL injection, and web application security. will necessitate a more thorough comprehension of typical vulnerabilities and exploitation strategies.
  • Challenges at the expert level: This series of tasks has been specifically designed to test your knowledge and creativity. Resourcefulness, a thorough comprehension of cybersecurity principles, and innovative thinking will be necessary to meet these difficulties. The difficulties are intricate and could include subjects like advanced cryptography, reverse engineering, and advanced penetration testing. It would take a thorough understanding of several cybersecurity fields to attempt these.

Round 2

  • Individuals chosen from “Round 1” will be qualified to compete in “Round 2.” The TCS team will proctor the second round, which will take place remotely.
  • Activity 1: Examining hosted challenges for penetration
  • The hosted challenge statements are given to the participant, who is expected to use his or her intuition to solve them. Challenge statements in this round might require expertise in the following areas as well:

Prizes/Awards/Rewards

  • The participant expressly acknowledges and understands that merely declaring oneself the winner does not grant one the right to the prize, award, or reward. The winning will only be confirmed if all of the requirements listed below are met and the rules are followed, to TCS’s satisfaction.
  • The top ten competitors from the second round will be invited to meet with TCS executives at the award event.
  • The best-performing Subject to the interview process and other selection criteria, participants who pass Round 2 may have the opportunity to obtain provisional job offers for “Ninja or Digital,” at TCS’ sole discretion and in accordance with its current rules.
  • The top-performing contestants receive rewards totaling up to INR 5 lakhs.

Apply Link: Click Here

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top