| 7 March | NCO Online Prelims Contest | 0900 to 1300 |
|---|---|---|
| 28 March | NCO Final Contest | 0900 to 1400 |
| Date: | 7 March 2026 |
|---|---|
| Session: | 9 AM - 1 PM (SGT) |
| Duration: | 4 hours |
| Format: | Jeopardy-style CTF challenges |
| Date: | 28 Mar 2026 |
|---|---|
| Session: | 9 AM - 2 PM (SGT) |
| Venue: | MPSH COM3 |
This syllabus for the National Cybersecurity Olympiad (NCO) Prelims 2026 serves the following purposes:
In line with the traditional categories encountered in cybersecurity competitions, such as Capture The Flag (CTF) competitions, we classify a selection of topics into five main categories:
The set of topics presented aims to be as comprehensive as possible but may not be exhaustive. Further details on topics, subtopics and concepts will be released in a future update.
A web browser is required to access the contest platform. Supported browsers include (but not limited to):
Contestants are reminded that the following Operating Systems are officially supported:
Contestants may use other Operating Systems, however the NCO 2026 Organising Team cannot provide any guarantees that all software and challenges will run smoothly on other systems. It is heavily recommended that you use a 64-bit x86 system. Modern Mac systems (aarch64 Apple Silicon devices) may not be supported. Additionally, Contestants are discouraged from running Dual Booted systems. Contestants will not be allowed to remotely connect to/mirror an external server/device as your playing environment.
Beyond OBS screen recording and OpenVPN software, The NCO 2026 Organising Team will not impose any required software for the competition. However, it is heavily recommended that all contestants have the following installed to be able to interact with some of the challenges:
In the syllabus section, a list of additional recommended tools and software has been included as well (see detailed syllabus).
As there is a complete and total ban on Artificial Intelligence (AI) tools for NCO 2026 Prelims, the following software are strictly prohibited:
In general, tools that leverage Generative AI i.e. LLMs, Diffusion Models, will be banned. The NCO 2026 Organising Team acknowledges there exists software that leverages AI as part of its processing workflow and does not fully automate solving of challenges e.g. Pylingual, which uses NLP to decompile compiled Python. Such software ought to be permitted, but it presents an ambiguous grey area where there may or may not be an extreme unfair competitive advantage.
A non-exhaustive list of examples for software or tools which may be permitted includes:
It is recommended that a Contestant utilises alternative tools that do not require AI to avoid ambiguity in AI use. As the NCO 2026 Organising Team does not wish to completely restrict the tools a Contestant may use, if a Contestant is unsure as to whether a specific tool is permitted, Proctors are to compile such queries and contact the NCO 2026 Organising Team (dcsbox42@nus.edu.sg). Otherwise, in the event of a screen recording review or later investigation, the Contestant may be disqualified for using AI powered tools that have not been approved.
As internet access is restricted during the contest, Contestants are additionally reminded to ensure their tools and software are able to be used offline. Exceptions may be made for certain software (primarily those outlined in the recommended software section) but the NCO 2026 Organising Team provides no guarantees in this regard.
The detailed syllabus can be found here.
Contestants should know and understand the basic structure and operation of a computer (CPU, memory, I/O). They are expected to be able to use a standard computer with a graphical user interface, its operating system with supporting applications, and the provided program development tools for the purpose of solving the competition's challenges.
Contestants should know and understand the operation of Linux executable files (ELF) and their common vulnerabilities. They are expected to be familiar with common stack and heap primitives, as well as how to exploit them. Students are to know how to spot vulnerabilities in binaries and convert given primitives to arbitrary code execution.
Contestants should be familiar with common cryptosystems, as well as known attacks and algorithms associated with them, including cases where the same attacks are applied to other systems. Students are to acquaint themselves with post-quantum cryptography as well.
Contestants should know and understand how to extract information from data files and forensics images and interpret and analyse obtained information. Knowledge in analysing network protocols and memory dumps is also necessary.
Contestants should know and understand how common executables (e.g. PE32+, ELF) operate. They are expected to be familiar with decompilation and debugging as well as relevant techniques and skills to interpret and reverse engineer binaries and algorithms.
Contestants should know and understand the common vulnerabilities present in web applications. They are expected to be familiar with exploiting both client and server-side vulnerabilities.
Past challenges can be downloaded from here.
Participants can refer to the NCL online training materials (pre-recorded basic training videos below), covering the following topics:
Online platforms such as TryHackMe, picoCTF, and Hack The Box can be used as demos in the training program. Participants can use these platforms to learn and practice on the real CTF environment.
Participants can refer to any other relevant training resources (not limited to NCL materials).
Disclaimer: All cited sources on this page, except for the course videos, belong to their respective owners, and while the site may include third-party links for educational purposes, we do not own, monitor, or take responsibility for these external resources or any interactions with third-party providers.
Main Organisers: Tan Sun Teck; Kee Zhen Xian
Co-Organiser: Nitya Lakshmanan
Technical Chair: Zhu YongZe
Scientific Chair: Kee Zhen Xian
Scientific Vice-Chair: Lim Kang Wei David
Secretary: Justin Lim
The NCO Technical Committee is tasked with the preparation and maintenance of contest infrastructure and configuring of contest problems for the NCO. The following are current members of the NCO Technical Committee:
The NCO Scientific Committee is tasked with the setting, preparation, and selection of problems for all contests of the NCO. The following are current members of the NCO Scientific Committee: