From 3b1ea500e17fcb5d951d97d9aef58ab656d1a2a4 Mon Sep 17 00:00:00 2001 From: JS Ng Date: Mon, 6 Apr 2026 07:56:25 +0000 Subject: [PATCH 1/2] content: add empty page with header --- pages/nco-training.md | 7 +++++++ 1 file changed, 7 insertions(+) create mode 100644 pages/nco-training.md diff --git a/pages/nco-training.md b/pages/nco-training.md new file mode 100644 index 0000000..9cdced3 --- /dev/null +++ b/pages/nco-training.md @@ -0,0 +1,7 @@ +--- +title: NCO Training +permalink: "/nco-training" +layout: page +style: assets/custom.css +--- + From d2a5ccd66766474fc84cd09fb838cc1ef209ef18 Mon Sep 17 00:00:00 2001 From: jade Date: Mon, 6 Apr 2026 21:47:39 +0800 Subject: [PATCH 2/2] write page contents --- pages/nco-training.md | 40 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) diff --git a/pages/nco-training.md b/pages/nco-training.md index 9cdced3..15c03a8 100644 --- a/pages/nco-training.md +++ b/pages/nco-training.md @@ -5,3 +5,43 @@ layout: page style: assets/custom.css --- +## Training Resources for Participants + +To help students prepare, we have compiled a list of recommended training materials: +NCL Online Training Materials (Pre-recorded Videos) available [here](https://ico2025.sg/training-materials/). +Students can access structured training sessions at ICO Training Materials, covering: + +## Basic Topics: + +- Session 1: Cryptography +- Session 2: Networking Fundamentals +- Session 3: Red Teaming & Introduction to CTF (For CTF example questions, students can refer to Session 3: Red Teaming & Introduction to CTF, specifically segments 9 to 12.) +- Session 4: Digital Forensics + +## Advanced Topics: + +- Session 5: Additional Topics on Networking +- Session 6: Python Programming for CTF Challenges +- Session 7: Advanced Digital Forensics + +## Example Questions and Topics: + +We recommend students refer to [picoctf](https://picoctf.org/) to practice CTF-style questions. +They can start with the General category CTF questions and then try the questions in categories such as Cryptography (e.g., hashing, password cracking), Networking, Forensics, Web Exploitation and Binary Exploitation. + +## Programming Knowledge Requirements: + +To effectively participate in the contest, students are encouraged to have a basic understanding of Python and C programming, particularly in the following areas: + +1. **Python Programming:** + + - **Basic concepts:** Variables, Data Types, Conditional Statements, Loops, File I/O, OOP, Exception Handling + - **Network libraries:** Requests, Socket, Scapy, Paramiko, Socket.IO, HTTPx, PyCurl + - **Cryptography libraries:** SSL, Cryptography, PyCrypto, PyCryptodome, Hashlib, PyNaCl + - **Penetration testing libraries:** Impacket, Python-nmap, Pwntools, BeautifulSoup + +2. **C Programming:** + + - Basic syntax and structure, Data types, Memory management, Control structures, Functions, Pointers & Arrays + - File I/O, Bitwise operations, Buffer overflows, Structs & Typedefs, Assembly & System Calls, Debugging tools (optional) + - Students are encouraged to explore any additional resources they find useful beyond NCL’s materials.