Skip to main content
Rate:  

Frequently Asked Questions

What is the BlueHat Challenge?
The BlueHat Challenge is a series of computer security problems of increasing difficulty to help you build and test your skills in three areas: reverse engineering, vulnerability discovery, and forensics.

How does it work?
The problems are given and corrected over email. When you get all the problems right in a given level of a track, we’ll send you the next set.

Why is Microsoft doing this?
We hope to spur interest in computer security and help people improve their skills through a self-directed learning process. We also want to give something back to the community—we think these problems are going to be a lot of fun for you to solve. We had a lot of fun coming up with them!

How long should I expect to wait for my problems to be corrected?
The timeline for evaluating the problems will depend on the number of participants in the program, the difficulty of the problem, and the clarity of your answer. The problems are being corrected by real people, so please be patient with us!

How long will the program continue?
We plan to continue the program as long as there is sufficient community interest. Of course, we may change the program’s design over time as we learn what works best, and we may cancel the program at any time without notice.

Is this the new monetary incentive/bounty program I've heard about?
No. This program is an educational challenge with no monetary reward. The new programs that offer monetary incentive are the Security Bounty Programs.

Where can I find information on Microsoft jobs?
Check out http://www.twccareers.com for careers in Microsoft Trustworthy Computing. See http://www.microsoft.com/careers for more general Microsoft career information.

If I complete the Challenge and do well, am I guaranteed an interview or a job?
No. Your completion of the Challenge or your performance will not guarantee that you will get an interview or a job, nor will it preclude you from doing so. If you are interested in careers with Microsoft Trustworthy Computing, we encourage you to visit http://www.twccareers.com, where you can submit an application for any open positions that interest you.

Featured Video

Importance of Outreach: Our strategy with security researchers

BlueHat Blog

Microsoft Security :: Bluehat Challenge | Frequently Asked Questions:

More Posts

BlueHat Archive

See past BlueHat Sessions

BlueHat v12

BlueHat v11

BlueHat v10

BlueHat v9

BlueHat v8