











































































































































































.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)


.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

[ Operation Milestones ]
Talks + training + mock CTF
Online jeopardy round
On-site competition
[ Expert Speakers ]

Program Manager


Senior Security Analyst


Head of Mobile Security


Security Engineer


Product Security Engineer


Senior Security Engineer


Security Researcher


Security Engineer


Reverse Engineer and Antibot Bypass Specialist


Security Consultant



> A dormant deep-orbit system has resumed transmission. Unidentified protocols, unauthorized access attempts, and system anomalies have been detected across critical digital infrastructure.
> In response, Amrita InCTF 2026 has been activated as a national-level operation to recruit, train, and evaluate cyber defence personnel capable of analysing advanced threats, decoding unfamiliar systems, and securing sensitive digital assets under real-world conditions.













© Amrita InCTF 2026
Conducted by Amrita Vishwa Vidyapeetham
Organized with team bi0s
