A new era of cybersecurity excellence. Join the nation’s brightest minds at GITEX GLOBAL 2025 for a two-day CTF that pushes the limits of innovation, skill, and security.
Solve challenges across multiple categories to earn points.
Test your skills in web, crypto, reversing, and more.
Find vulnerabilities, solve puzzles, submit flags.
Online qualification round and selection of teams for onsite finals
The qualification round is conducted entirely online. Participants compete by solving cybersecurity challenges across various categories to demonstrate their skills.
After the qualification period ends on Friday, October 10, our team will review the results and select the top-performing teams for the onsite finals based on internal criteria. Selected participants will receive an email invitation with further details.
Note: Solving all qualification challenges does not guarantee selection. Teams are selected based on internal criteria that are not publicly announced.
Important: You must confirm your attendance within the specified timeframe, or your spot will be offered to another team.
Attack-focused challenges and offensive security tactics
Time | Agenda Item | Details |
---|---|---|
10:30 AM | Participant Arrival & Technical Setup | Registration, environment preparation, and networking. |
11:00 AM | Opening & Welcome Address | Moderator's opening remarks and overview of the competition. |
11:15 AM | CTF Kickoff: Attack | The competition officially begins with foundational and intermediate cybersecurity challenges across offensive security domains: Web security, network pentesting, and AI hacking. |
5:00 PM | Competition pauses | Leaderboard review and preparation for cyber defense challenges on Day 2. |
Defense challenges, awards ceremony, and technical briefings
Time | Agenda Item | Details |
---|---|---|
11:00 AM | Opening of CTF Day 2 | Technical overview of the CTF content |
11:15 AM | CTF Resumes: Defense | The competition resumes with a new wave of challenges across defensive security domains: digital forensics, threat hunting and log investigation. |
2:00 PM | Competition concludes | Countdown towards the end of the CTF. Scores are validated and awarding ceremony begins. |
2:10 PM | CTF Awarding | Led by H.E. Dr. Mohamed Alkuwaiti, Head of Cyber Security for the UAE Government. Recognition of top-performing teams with prizes. |
2:30 PM | Technical briefings: Attack | A focused session on offensive cybersecurity tactics, real-world exploitation methods, and emerging threat landscapes. |
3:30 PM | Technical briefings: gamification in cyber | Exploring innovative ways to apply gamification principles to cybersecurity training, awareness, and skill-building. |
4:00 PM | Interactive Q&A session | Open forum discussion with CTFAE. We want to hear directly from the community. |
Everything you need to know about this CTF event
Solve challenges across multiple categories to earn points.
Test your skills in web, crypto, reversing, and more.
Find vulnerabilities, solve puzzles, submit flags.
Online qualification round - October 8-10
The qualification round is conducted entirely online. Participants compete by solving cybersecurity challenges across various categories to demonstrate their skills.
After the qualification period ends on Friday, October 10, our team will review the results and select the top-performing teams for the onsite finals based on internal criteria. Selected participants will receive an email invitation with further details.
Note: Solving all qualification challenges does not guarantee selection. Teams are selected based on internal criteria that are not publicly announced.
Important: You must confirm your attendance within the specified timeframe, or your spot will be offered to another team.
Attack-focused challenges and offensive security tactics
Time | Agenda Item | Details |
---|---|---|
10:30 AM | Participant Arrival & Technical Setup | Registration, environment preparation, and networking. |
11:00 AM | Opening & Welcome Address | Moderator's opening remarks and overview of the competition. |
11:15 AM | CTF Kickoff: Attack | The competition officially begins with foundational and intermediate cybersecurity challenges across offensive security domains: Web security, network pentesting, and AI hacking. |
5:00 PM | Competition pauses | Leaderboard review and preparation for cyber defense challenges on Day 2. |
Defense challenges, awards ceremony, and technical briefings
Time | Agenda Item | Details |
---|---|---|
11:00 AM | Opening of CTF Day 2 | Technical overview of the CTF content |
11:15 AM | CTF Resumes: Defense | The competition resumes with a new wave of challenges across defensive security domains: digital forensics, threat hunting and log investigation. |
2:00 PM | Competition concludes | Countdown towards the end of the CTF. Scores are validated and awarding ceremony begins. |
2:10 PM | CTF Awarding | Led by H.E. Dr. Mohamed Alkuwaiti, Head of Cyber Security for the UAE Government. Recognition of top-performing teams with prizes. |
2:30 PM | Technical briefings: Attack | A focused session on offensive cybersecurity tactics, real-world exploitation methods, and emerging threat landscapes. |
3:30 PM | Technical briefings: gamification in cyber | Exploring innovative ways to apply gamification principles to cybersecurity training, awareness, and skill-building. |
4:00 PM | Interactive Q&A session | Open forum discussion with CTFAE. We want to hear directly from the community. |
Everything you need to know about this CTF event