NCIIPC-AICTE Pentathon 2026 Culminates with Intensive Cybersecurity Bootcamp at MIT Manipal
The national cybersecurity competition, Pentathon 2026, successfully concluded its final phase with a comprehensive five-day advanced bootcamp focused on Controlled Penetration Testing. This significant event was hosted at the prestigious Manipal Institute of Technology (MIT) in Manipal, marking the pinnacle of the flagship initiative jointly organized by the National Critical Information Infrastructure Protection Centre (NCIIPC) and the All-India Council for Technical Education (AICTE).
Collaborative Hosting and National Significance
The bootcamp was conducted at the School of Computer Engineering, MIT, in close collaboration with the Centre of Excellence for Cyber Security at MAHE (Manipal Academy of Higher Education). This partnership underscored the commitment to fostering cutting-edge cybersecurity education and training across India. Pentathon 2026 unfolded through multiple competitive stages, attracting widespread participation from aspiring cybersecurity professionals nationwide, aiming to identify and nurture talent in this critical field.
Competitive Phases and Finalist Selection
The competition commenced with an initial jeopardy-style online Capture the Flag (CTF) challenge, designed to assess skills in ethical hacking and penetration testing. After several rigorous rounds, over 200 top-performing finalists advanced to the grand finale. In this ultimate stage, participants engaged with fictionalised enterprise-grade cyber-attack scenarios, meticulously modelled on real-world threats to critical information infrastructure, providing a realistic testing ground for their abilities.
Immersive Training Curriculum and Practical Focus
The advanced bootcamp offered an immersive training experience specifically crafted to enhance practical cybersecurity capabilities. The comprehensive curriculum covered essential areas including:
- Cloud Security: Strategies and techniques for securing cloud-based systems and data.
- Malware Analysis and Incident Response: Methods to analyze malicious software and effectively respond to security incidents.
- Cryptography: Principles and applications of encryption and data protection.
- Vulnerability Assessment and Penetration Testing (VAPT) Foundations: Core skills for identifying and exploiting system vulnerabilities.
Additionally, the program featured hands-on cyber laboratory simulations and a capstone challenge, allowing participants to apply their knowledge in controlled, practical environments. This approach ensured that finalists not only learned theoretical concepts but also gained valuable experience in tackling complex cybersecurity issues, preparing them for real-world scenarios in protecting national critical infrastructure.



