{"id":14,"date":"2025-07-12T06:57:09","date_gmt":"2025-07-12T06:57:09","guid":{"rendered":"https:\/\/stem-comsi.com\/?page_id=14"},"modified":"2026-04-08T06:18:17","modified_gmt":"2026-04-08T06:18:17","slug":"competition","status":"publish","type":"page","link":"https:\/\/stem-comsi.com\/?page_id=14","title":{"rendered":"Challenges"},"content":{"rendered":"\n<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n  <meta charset=\"UTF-8\" \/>\n  <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\" \/>\n  <title>RCBC Cybersecurity Department | Student Challenges and Competitions<\/title>\n  <style>\n    :root{\n      --rcbc-red:#b5121b;\n      --rcbc-dark:#222222;\n      --rcbc-light:#f7f7f7;\n      --white:#ffffff;\n      --text:#1f1f1f;\n      --muted:#666666;\n      --border:#dddddd;\n      --shadow:0 10px 24px rgba(0,0,0,0.08);\n    }\n\n    *{box-sizing:border-box}\n\n    body{\n      margin:0;\n      font-family:Arial, Helvetica, sans-serif;\n      background:var(--white);\n      color:var(--text);\n      line-height:1.6;\n    }\n\n    a{\n      text-decoration:none;\n      color:inherit;\n    }\n\n    .container{\n      width:min(1180px, 92%);\n      margin:0 auto;\n    }\n\n    .topbar{\n      background:var(--rcbc-dark);\n      color:#fff;\n      padding:10px 0;\n      font-size:14px;\n    }\n\n    .topbar-inner,\n    .nav-inner,\n    .hero-grid,\n    .feature-grid,\n    .challenge-grid,\n    .footer-grid{\n      display:flex;\n      justify-content:space-between;\n      align-items:center;\n      gap:20px;\n      flex-wrap:wrap;\n    }\n\n    .top-links,\n    .nav-links{\n      display:flex;\n      gap:18px;\n      flex-wrap:wrap;\n      align-items:center;\n    }\n\n    .top-links a,\n    .nav-links a{\n      color:#fff;\n      font-weight:600;\n    }\n\n    .navbar{\n      background:var(--rcbc-red);\n      color:#fff;\n      position:sticky;\n      top:0;\n      z-index:1000;\n      box-shadow:0 4px 14px rgba(0,0,0,0.1);\n    }\n\n    .nav-inner{\n      padding:18px 0;\n    }\n\n    .brand{\n      font-size:28px;\n      font-weight:800;\n      letter-spacing:.4px;\n      line-height:1.1;\n    }\n\n    .brand span{\n      display:block;\n      font-size:13px;\n      font-weight:700;\n      letter-spacing:1.5px;\n      margin-top:4px;\n      text-transform:uppercase;\n      color:#ffe8ea;\n    }\n\n    .hero{\n      background:\n        linear-gradient(rgba(0,0,0,.62), rgba(0,0,0,.62)),\n        url(\"https:\/\/images.unsplash.com\/photo-1516321318423-f06f85e504b3?auto=format&fit=crop&w=1600&q=80\") center\/cover no-repeat;\n      color:#fff;\n      padding:80px 0 65px;\n    }\n\n    .hero-grid{\n      align-items:flex-start;\n    }\n\n    .hero-copy{\n      flex:1 1 650px;\n    }\n\n    .eyebrow{\n      text-transform:uppercase;\n      letter-spacing:1.7px;\n      font-size:13px;\n      font-weight:800;\n      color:#ffd7da;\n      margin-bottom:10px;\n    }\n\n    .hero-copy h1{\n      margin:0 0 18px;\n      font-size:clamp(34px, 5vw, 58px);\n      line-height:1.08;\n    }\n\n    .hero-copy p{\n      margin:0 0 22px;\n      font-size:18px;\n      max-width:760px;\n      color:#f2f2f2;\n    }\n\n    .hero-badges{\n      display:flex;\n      gap:10px;\n      flex-wrap:wrap;\n      margin-top:18px;\n    }\n\n    .badge{\n      background:rgba(255,255,255,0.12);\n      border:1px solid rgba(255,255,255,0.22);\n      border-radius:999px;\n      padding:9px 14px;\n      font-size:14px;\n      font-weight:700;\n    }\n\n    .hero-card{\n      flex:1 1 300px;\n      background:rgba(255,255,255,.97);\n      color:var(--text);\n      border-radius:20px;\n      box-shadow:var(--shadow);\n      padding:28px;\n    }\n\n    .hero-card h3{\n      margin:0 0 12px;\n      color:var(--rcbc-red);\n      font-size:24px;\n    }\n\n    .hero-card ul{\n      margin:0;\n      padding-left:18px;\n    }\n\n    .section{\n      padding:72px 0;\n    }\n\n    .section.alt{\n      background:var(--rcbc-light);\n    }\n\n    .section-tag{\n      color:var(--rcbc-red);\n      text-transform:uppercase;\n      letter-spacing:1.5px;\n      font-size:13px;\n      font-weight:800;\n      margin-bottom:10px;\n    }\n\n    .section h2{\n      margin:0 0 14px;\n      font-size:clamp(28px, 4vw, 42px);\n      line-height:1.15;\n    }\n\n    .section-intro{\n      max-width:820px;\n      color:var(--muted);\n      font-size:17px;\n      margin-bottom:34px;\n    }\n\n    .feature-grid,\n    .challenge-grid,\n    .footer-grid{\n      align-items:stretch;\n    }\n\n    .feature-card,\n    .challenge-card{\n      flex:1 1 260px;\n      background:#fff;\n      border:1px solid var(--border);\n      border-radius:20px;\n      padding:26px;\n      box-shadow:var(--shadow);\n    }\n\n    .feature-card h3,\n    .challenge-card h3{\n      margin:0 0 10px;\n      color:var(--rcbc-red);\n      font-size:22px;\n    }\n\n    .feature-card p,\n    .challenge-card p{\n      margin:0;\n      color:var(--muted);\n    }\n\n    .challenge-card{\n      position:relative;\n      overflow:hidden;\n    }\n\n    .challenge-card::before{\n      content:\"\";\n      position:absolute;\n      top:0;\n      left:0;\n      width:100%;\n      height:5px;\n      background:var(--rcbc-red);\n    }\n\n    .links-grid{\n      display:grid;\n      grid-template-columns:repeat(auto-fit, minmax(170px, 1fr));\n      gap:14px;\n      margin-top:24px;\n    }\n\n    .topic-link{\n      display:block;\n      background:#fff;\n      border:1px solid var(--border);\n      border-radius:14px;\n      padding:15px 16px;\n      font-weight:700;\n      box-shadow:0 6px 16px rgba(0,0,0,0.05);\n      transition:.2s ease;\n    }\n\n    .topic-link:hover{\n      transform:translateY(-3px);\n      border-color:var(--rcbc-red);\n      color:var(--rcbc-red);\n    }\n\n    .acknowledgement{\n      background:linear-gradient(135deg, #1f1f1f, #3b3b3b);\n      color:#fff;\n      border-radius:24px;\n      padding:38px 30px;\n      box-shadow:var(--shadow);\n    }\n\n    .acknowledgement h2{\n      margin-top:0;\n      color:#fff;\n    }\n\n    .acknowledgement p{\n      color:#ededed;\n      font-size:17px;\n      margin-bottom:16px;\n    }\n\n    footer{\n      background:#1b1b1b;\n      color:#f1f1f1;\n      padding:54px 0 24px;\n    }\n\n    .footer-col{\n      flex:1 1 220px;\n    }\n\n    .footer-col h4{\n      margin:0 0 14px;\n      font-size:18px;\n      color:#fff;\n    }\n\n    .footer-col a{\n      display:block;\n      margin:8px 0;\n      color:#dfdfdf;\n    }\n\n    .copyright{\n      margin-top:28px;\n      padding-top:18px;\n      border-top:1px solid rgba(255,255,255,0.12);\n      font-size:14px;\n      color:#cccccc;\n    }\n\n    @media (max-width:860px){\n      .nav-links{display:none}\n      .hero{padding:60px 0 50px}\n    }\n  <\/style>\n<\/head>\n<body>\n\n  <div class=\"topbar\">\n    <div class=\"container topbar-inner\">\n      <div>RCBC Cybersecurity Department | Student Challenges and Competitions<\/div>\n      <div class=\"top-links\">\n        <a href=\"#about\">About<\/a>\n        <a href=\"#challenges\">Challenges<\/a>\n        <a href=\"#competitions\">Competitions<\/a>\n        <a href=\"#thanks\">Acknowledgements<\/a>\n      <\/div>\n    <\/div>\n  <\/div>\n\n  <nav class=\"navbar\">\n    <div class=\"container nav-inner\">\n      <a href=\"#\" class=\"brand\">\n        RCBC Cybersecurity Department\n        <span>Student Challenges and Competitions<\/span>\n      <\/a>\n\n      <div class=\"nav-links\">\n        <a href=\"#about\">About<\/a>\n        <a href=\"#challenges\">Challenges<\/a>\n        <a href=\"#competitions\">Competitions<\/a>\n        <a href=\"#thanks\">Acknowledgements<\/a>\n      <\/div>\n    <\/div>\n  <\/nav>\n\n  <header class=\"hero\">\n    <div class=\"container hero-grid\">\n      <div class=\"hero-copy\">\n        <div class=\"eyebrow\">Hands-On Skills \u2022 Real-World Scenarios \u2022 Student Growth<\/div>\n        <h1>RCBC STEM cybersecurity students learning through challenges, competitions, and real-world technical experiences.<\/h1>\n        <p>\n          This web site is designed for students to strengthen hands-on skills, solve realistic technology and cybersecurity\n          problems, prepare for certification exams, and participate in engaging challenges and competitions that reflect\n          real-world environments.\n        <\/p>\n        <p>\n          Students can explore cybersecurity, networking, systems administration, programming, digital forensics, ethical hacking,\n          artificial intelligence, and other technical areas through guided challenge experiences built to support growth,\n          teamwork, and problem-solving.\n        <\/p>\n\n        <div class=\"hero-badges\">\n          <span class=\"badge\">Hands-On Learning<\/span>\n          <span class=\"badge\">Certification Prep<\/span>\n          <span class=\"badge\">Challenges<\/span>\n          <span class=\"badge\">Competitions<\/span>\n          <span class=\"badge\">Real-World Scenarios<\/span>\n        <\/div>\n      <\/div>\n\n      <aside class=\"hero-card\">\n        <h3>Student Focus<\/h3>\n        <ul>\n          <li>Practice technical skills through realistic tasks<\/li>\n          <li>Build confidence with hands-on lab experiences<\/li>\n          <li>Prepare for competitions and certification exams<\/li>\n          <li>Improve troubleshooting and critical thinking<\/li>\n          <li>Engage in meaningful cybersecurity challenges<\/li>\n        <\/ul>\n      <\/aside>\n    <\/div>\n  <\/header>\n\n  <section class=\"section\" id=\"about\">\n    <div class=\"container\">\n      <div class=\"section-tag\">About<\/div>\n      <h2>Built for student challenges and competitions<\/h2>\n      <p class=\"section-intro\">\n        RCBC Cybersecurity Department provides students with opportunities to apply classroom knowledge in practical ways.\n        This site focuses on challenge-based learning and competitions that help students develop technical ability, problem-solving,\n        teamwork, and readiness for real cybersecurity and information technology environments.\n      <\/p>\n\n      <div class=\"feature-grid\">\n        <div class=\"feature-card\">\n          <h3>Real-World Tasks<\/h3>\n          <p>Students work through scenarios that reflect the kinds of tasks performed in IT, networking, cybersecurity, systems administration, and programming environments.<\/p>\n        <\/div>\n        <div class=\"feature-card\">\n          <h3>Competition Readiness<\/h3>\n          <p>Activities help students prepare for cybersecurity competitions, technical events, lab exercises, and challenge-based classroom experiences.<\/p>\n        <\/div>\n        <div class=\"feature-card\">\n          <h3>Certification Support<\/h3>\n          <p>The site reinforces the knowledge and hands-on skills students need as they prepare for leading certification exams and technical benchmarks.<\/p>\n        <\/div>\n        <div class=\"feature-card\">\n          <h3>Hands-On Practice<\/h3>\n          <p>Students gain confidence by actively doing the work, not just reading about it, through guided labs, exercises, and technical problem-solving.<\/p>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/section>\n\n  <section class=\"section alt\" id=\"challenges\">\n    <div class=\"container\">\n      <div class=\"section-tag\">Challenges<\/div>\n      <h2>Challenge categories<\/h2>\n      <p class=\"section-intro\">\n        Each area below can connect to its own challenge page, competition page, or resource hub.\n        Replace each <code>#<\/code> link with the correct destination for your site.\n      <\/p>\n\n      <div class=\"challenge-grid\">\n        <div class=\"challenge-card\">\n          <h3>Cybersecurity and IT<\/h3>\n          <p>Hands-on technical challenges for troubleshooting, securing systems, analyzing threats, and building practical job-ready skills.<\/p>\n          <div class=\"links-grid\">\n            <a class=\"topic-link\" href=\"#\">A+<\/a>\n            <a class=\"topic-link\" href=\"#\">Network+<\/a>\n            <a class=\"topic-link\" href=\"#\">Security+<\/a>\n            <a class=\"topic-link\" href=\"#\">PenTest+<\/a>\n            <a class=\"topic-link\" href=\"#\">Computer Forensics<\/a>\n            <a class=\"topic-link\" href=\"#\">CySA+<\/a>\n            <a class=\"topic-link\" href=\"#\">Ethical Hacking<\/a>\n            <a class=\"topic-link\" href=\"#\">Linux+<\/a>\n            <a class=\"topic-link\" href=\"#\">Windows Server<\/a>\n            <a class=\"topic-link\" href=\"#\">Cisco<\/a>\n            <a class=\"topic-link\" href=\"#\">AI<\/a>\n          <\/div>\n        <\/div>\n\n        <div class=\"challenge-card\">\n          <h3>Programming<\/h3>\n          <p>Programming challenges that strengthen coding, logic, debugging, scripting, and software problem-solving skills.<\/p>\n          <div class=\"links-grid\">\n            <a class=\"topic-link\" href=\"#\">Python<\/a>\n            <a class=\"topic-link\" href=\"#\">Java<\/a>\n            <a class=\"topic-link\" href=\"#\">R<\/a>\n            <a class=\"topic-link\" href=\"#\">C<\/a>\n            <a class=\"topic-link\" href=\"#\">Ruby<\/a>\n            <a class=\"topic-link\" href=\"#\">Perl<\/a>\n            <a class=\"topic-link\" href=\"#\">Other Programming Languages<\/a>\n          <\/div>\n        <\/div>\n\n        <div class=\"challenge-card\">\n          <h3>Student Groups<\/h3>\n          <p>Challenge experiences can be organized for different student audiences and competition levels.<\/p>\n          <div class=\"links-grid\">\n            <a class=\"topic-link\" href=\"#\">Middle School<\/a>\n            <a class=\"topic-link\" href=\"#\">High School<\/a>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/section>\n\n  <section class=\"section\" id=\"competitions\">\n    <div class=\"container\">\n      <div class=\"section-tag\">Competitions<\/div>\n      <h2>Learning through competition and teamwork<\/h2>\n      <p class=\"section-intro\">\n        This site can also support student competitions by offering timed challenges, problem-solving events, team-based technical\n        exercises, defensive and offensive cybersecurity scenarios, programming contests, and digital investigation activities.\n      <\/p>\n\n      <div class=\"feature-grid\">\n        <div class=\"feature-card\">\n          <h3>Cyber Competitions<\/h3>\n          <p>Prepare for capture-the-flag style events, security analysis challenges, defense simulations, and team cyber exercises.<\/p>\n        <\/div>\n        <div class=\"feature-card\">\n          <h3>Programming Competitions<\/h3>\n          <p>Build coding speed, accuracy, and logic through structured programming challenges and language-based contests.<\/p>\n        <\/div>\n        <div class=\"feature-card\">\n          <h3>Team Collaboration<\/h3>\n          <p>Students strengthen communication, planning, and teamwork while working together to solve technical problems under pressure.<\/p>\n        <\/div>\n        <div class=\"feature-card\">\n          <h3>Technical Confidence<\/h3>\n          <p>Competition experiences help students gain confidence, improve decision-making, and demonstrate their growing technical abilities.<\/p>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/section>\n\n  <section class=\"section alt\" id=\"thanks\">\n    <div class=\"container\">\n      <div class=\"acknowledgement\">\n        <div class=\"section-tag\" style=\"color:#ffccd1;\">Acknowledgements<\/div>\n        <h2>Special thanks<\/h2>\n        <p>\n          RCBC&#8217;s President, Provost and OIT Department for their overall support.\n        <\/p>\n        <p>\n          Special thanks to <strong>Professor Paul Warner<\/strong>, whose ideas and oversight brought this idea into reality.\n        <\/p>\n        <p>\n          Thanks also to the Dean, <strong>Dr. Edem Tetteh<\/strong>, and Associate Dean, <strong>Dr. Taziah Kenny<\/strong>,\n          for obtaining the necessary funding and support for resources to make the entire environment possible.\n        <\/p>\n      <\/div>\n    <\/div>\n  <\/section>\n\n  <footer>\n    <div class=\"container\">\n      <div class=\"footer-grid\">\n        <div class=\"footer-col\">\n          <h4>RCBC Cybersecurity Department<\/h4>\n          <a href=\"#about\">About<\/a>\n          <a href=\"#challenges\">Challenges<\/a>\n          <a href=\"#competitions\">Competitions<\/a>\n          <a href=\"#thanks\">Acknowledgements<\/a>\n        <\/div>\n\n        <div class=\"footer-col\">\n          <h4>Challenge Topics<\/h4>\n          <a href=\"#\">Cybersecurity<\/a>\n          <a href=\"#\">Networking<\/a>\n          <a href=\"#\">Systems Administration<\/a>\n          <a href=\"#\">Programming<\/a>\n          <a href=\"#\">Digital Forensics<\/a>\n        <\/div>\n\n        <div class=\"footer-col\">\n          <h4>Student Areas<\/h4>\n          <a href=\"#\">Middle School<\/a>\n          <a href=\"#\">High School<\/a>\n          <a href=\"#\">Challenges<\/a>\n          <a href=\"#\">Competitions<\/a>\n        <\/div>\n\n        <div class=\"footer-col\">\n          <h4>Department Identity<\/h4>\n          <p style=\"margin:0; color:#d9d9d9;\">\n            RCBC CYBERSECURITY DEPARTMENT\n          <\/p>\n        <\/div>\n      <\/div>\n\n      <div class=\"copyright\">\n        \u00a9 2026 RCBC Cybersecurity Department. Student Challenges and Competitions.\n      <\/div>\n    <\/div>\n  <\/footer>\n\n<\/body>\n<\/html>\n","protected":false},"excerpt":{"rendered":"<p>RCBC Cybersecurity Department | Student Challenges and Competitions RCBC Cybersecurity Department | Student Challenges and Competitions About Challenges Competitions Acknowledgements RCBC Cybersecurity [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-14","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/stem-comsi.com\/index.php?rest_route=\/wp\/v2\/pages\/14","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stem-comsi.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/stem-comsi.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/stem-comsi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stem-comsi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14"}],"version-history":[{"count":4,"href":"https:\/\/stem-comsi.com\/index.php?rest_route=\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":182,"href":"https:\/\/stem-comsi.com\/index.php?rest_route=\/wp\/v2\/pages\/14\/revisions\/182"}],"wp:attachment":[{"href":"https:\/\/stem-comsi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}