Get an insider's look at how cybersecurity Capture-the-Flag (CTF) challenges work in this hands-on, Train-the-Trainer workshop. Participants will work in teams of two to complete a guided CTF - solving real security puzzles, uncovering clues, and practicing defensive techniques in a safe, ethical environment.
You'll also learn how CTFs are designed, how to run them effectively, and how to transform real-world cyber scenarios into engaging learning experiences for your own students or teams.
Lunch will be provided (sandwiches).
Perfect for educators and technologists who want to strengthen their security skills while empowering the next generation of confident, capable digital citizens.
CTF Challenges Details:
- Dustbowl.dmz
-
- Theme: Password cracking & cipher decoding
- Focus:
-
- Scanning large volumes of data to identify what's important.
- Identifying and cracking a variety of encoded or encrypted data.
- Difficulty varies - some items can be cracked in minutes; others may take much longer depending on approach.
- Redcedar.dmz
-
- Theme: Hidden in plain sight
- Focus:
-
- Locating keys concealed in HTML markup, images, or various server-side locations.
- Healthbridge.dmz
-
- Theme: Poor coding practices
- Focus:
-
- Exploiting an SQL injection vulnerability to gain access to a mock medical system.
- Once the injection method is known, this challenge can be completed quickly.
About the Facilitator:

Joe Wetzel is an instructor at Fox Valley Technical College with more than 20 years of experience spanning information technology, software development, and ethical hacking. He is widely recognized as the creator of the DMZ, a purpose‑built cybersecurity playground that gives students a safe, realistic environment to attack, defend, and explore real‑world security scenarios.
Joe brings a builder’s mindset to cybersecurity education—combining hands‑on development, offensive security techniques, and a deep passion for helping learners grow practical, applicable skills. His current work explores how artificial intelligence can enhance cybersecurity through smarter detection, automation, and more adaptive learning experiences.
In addition to his cybersecurity expertise, Joe is deeply enthusiastic about mobile development and emerging technologies, constantly investigating how innovation reshapes modern security challenges.
As a participant in the event (“Participant”), I grant permission to Women in Technology - Wisconsin (WIT), and their representatives, successors, licensees, and program partners (hereinafter collectively “Licensed Parties”), to record and take screen captures in connection with this WIT event, and to publish, reproduce, distribute, and/or otherwise use (i) the Participant’s name and (iii) any still or moving photographic or digital image, likeness or sound recording (“Media”) of the Participant for use in Licensed Parties’ publications, website and related media. This license includes all copyrights in and all rights to use, publish and alter the Media and any spoken quote(s) in connection with the Media, without restrictions, for any lawful purpose (including by way of example and not limitation, publicity, illustration, presentations, and Web content), without compensation, and hereby release the Licensed Parties from liability related to the rights granted in this agreement. I have read the above consent and release and fully understand the contents thereof.