Build and run your own cybersecurity Capture-the-Flag (CTR) - with confidence
This hands-on, in-person workshop is designed for professional who teach, train or enable others in cybersecurity and want a practical, ready-to-use way to engage learners.
By the end of this session, you'll leave with:
- A clear understanding of how cybersecurity Capture-the-Flag (CTF) challenges are designed and executed.
- Firsthand experience completing a guided CTF in a safe, ethical environment.
- Practical guidance you can immediately apply to run a CTF for your students, classroom or internal teams.
This is not a lecture or a slide-based session - you'll actively work through real security puzzles and scenarios alongside peers.
Agenda:
- 11:30 - 12:30: Lunch and networking
- 12:30 - 1:00: Joe Wetzel "The State of Cybersecurity"
- 1:15 - 1:30: Outline of the Capture the Flag scenarios
- 1:30 - 3:30: Three Capture the Flag Challenges
- 3:30 - 4:00: Wrap up and Certifications of Completions
What You'll Do:
Participants will work in teams of two to complete a guided Capture-the-Flag experience, including challenges focused on:
- Password cracking and cipher decoding
- Identifying critical information within large volumes of data
- Discovering hidden clues embedded in code, markup and files
- Exploiting common vulnerabilities such as SQL injection (in a controlled, ethical environment)
You'll also learn how to:
- Design CTF challenges of varying difficulty
- Facilitate a successful CTF experience
- Translate real-world cyber scenarios into effective learning exercises
What You'll Do:
If you've ever wanted to:
- Make cybersecurity education more engaging
- Give learners hands-on, problem-solving experience
- Walk away with a concrete training format - not just ideas
About the Facilitator:

Joe Wetzel is an instructor at Fox Valley Technical College with more than 20 years of experience spanning information technology, software development, and ethical hacking. He is widely recognized as the creator of the DMZ, a purpose‑built cybersecurity playground that gives students a safe, realistic environment to attack, defend, and explore real‑world security scenarios.
Joe brings a builder’s mindset to cybersecurity education—combining hands‑on development, offensive security techniques, and a deep passion for helping learners grow practical, applicable skills. His current work explores how artificial intelligence can enhance cybersecurity through smarter detection, automation, and more adaptive learning experiences.
In addition to his cybersecurity expertise, Joe is deeply enthusiastic about mobile development and emerging technologies, constantly investigating how innovation reshapes modern security challenges.
As a participant in the event (“Participant”), I grant permission to Women in Technology - Wisconsin (WIT), and their representatives, successors, licensees, and program partners (hereinafter collectively “Licensed Parties”), to record and take screen captures in connection with this WIT event, and to publish, reproduce, distribute, and/or otherwise use (i) the Participant’s name and (iii) any still or moving photographic or digital image, likeness or sound recording (“Media”) of the Participant for use in Licensed Parties’ publications, website and related media. This license includes all copyrights in and all rights to use, publish and alter the Media and any spoken quote(s) in connection with the Media, without restrictions, for any lawful purpose (including by way of example and not limitation, publicity, illustration, presentations, and Web content), without compensation, and hereby release the Licensed Parties from liability related to the rights granted in this agreement. I have read the above consent and release and fully understand the contents thereof.