Overview
National Junior Informatics Olympiad (NJIO) an innovative approach designed to spark students’ interest in programming by leveraging the principles of computational thinking and block programming. This statement explains how NJIO accomplishes this goal by breaking down complex problems into manageable parts, fostering an engaging and accessible learning environment.
Objective
Popularize the field of cybersecurity among high school and university students, organize additional training in cybersecurity to enhance students’ knowledge and interest in a possible future profession, and stimulate the desire to study additional technology and cybersecurity topics.
Who is NJCO for?
The NJCO is designed for students in grades 8 through 12 and first and second-year undergraduates. The course and the exam will be the same for all students, although the classifcation will take place within each grade.
Format Of The Course
The NJCO course features 4 pre-recorded online video lessons, each 2 hours long, totaling 8 hours of content, tailored specifcally for high school and university students. Designed by the National Cybersecurity R&D Lab (NCL) and the Centre for Nurturing Computing Excellence (CeNCE), both hosted at the School of Computing, NUS, the course allows students to engage with the material at their own pace. This flexible learning format ensures that students can pause, rewind, and revisit lessons any time and from anywhere, maximizing their understanding of the various topics outlined in the syllabus.
Format Of The Test
The NJCO contest, taken after the workshop that precedes it, will consist of 40 multiple-choice questions divided into 10 questions for each topic presented in the Syllabus. Each correct answer will be awarded 2.5 points, and no points will be deducted for blank or incorrect answers.
Awards
The awards will adhere to CenCE’s classifcation criteria, followed by the NOI. Accordingly, let be the total number of participants in the NJCO competition.
Based on the ranking and scores of these participants, the following proportions will determine the distribution of awards:
- Gold Medals: about 1/12 of the contestants in each grade (Top 8.3%).
- Silver Medals: about 1/6 of the contestants in each grade (Next 16.7%).
- Bronze Medals: about 1/4 of the contestants in each grade (Next 25%).
Syllabus
- Topic 1: Cryptography
This topic introduces Cryptography, including encryption, hash techniques, pitfalls, and its historical context. These concepts are of fundamental importance in laying the foundations of cybersecurity. Students will learn and experience adversarial thinking through examples, understand what cryptography can achieve, and become familiar with some common types of cryptography and its intriguing techniques.
- Topic 2: Networking Fundamentals
This topic introduces adversarial thinking in networks, network discovery through the Wireshark tool, and the Era of Digitalization. Students will also learn how to trace the network journey from the URL to a webpage, gaining an overview of the source page and exploring the functionalities of the Wireshark network tool.
- Topic 3: Red Teaming & Introduction to CTFs
This topic introduces the fundamental concepts of Capture the Flag (CTF) competitions and their many categories. In addition, students will become familiar with Linux operating systems, including basic commands, file permissions and processing, and how to install software and tools in a Linux environment. Furthermore, students will explore the programming languages commonly used to solve CTF challenges, supplemented with practical CTF demonstrations.
- Topic 4: Digital Forensics
This topic introduces Digital Forensics, covering the main stages of the digital forensics process, such as the identification, preservation, collection, examination, analysis, and presentation of digital evidence. Students will explore various types of digital evidence, such as Network Traffic Logs, Memory Dumps, Data Imaging, and File System Artifacts. Additionally, students will become familiar with the tools commonly used in forensic investigations. Hands-on exercises will provide practical experience in the application of forensic techniques and tools in real-world scenarios.




Instructor
Charlie Slater
Senior UI UX DesignerCharlie Slater has over 8 years of experience building scalable web applications with
UI UX Designer. He's worked at top tech companies including Google and Airbnb,
and has taught over 50,000 students worldwide. His passion for teaching and deep
understanding of React makes complex concepts easy to understand and implement..