May 24, 2017

Welcome UAT Students | Connect Spring 2016

Connect




Welcome new students to University of Advancing Technology! You are beginning your journey of innovation with many other technophiles like yourself. We hope you feel at home here – whether you are moving in to the dorms, UAT Founder’s Hall, commuting to campus daily or attending our campus online.  We can’t wait to for you to get settled, get familiar with the campus, meet new friends and learn what it means to be an innovator at UAT. The sky is not the limit, you can take your ideas anywhere with technology! Don’t miss out on any of the action starting the first…

UAT Cyber Security Degree Students Participate in November WRCCDC Invitational

WRCCDC Invitational




The November Western Regional Collegiate Cyber Defense Competition (WRCCDC) Invitational was held Saturday, November 7, from 10:30 a.m. – 4:30 p.m. UAT had eight Cyber Security Degree/Network Security Degree students complete, seven of them participating for the first time. The WRCCDC Invitational is a virtual competition that UAT Cyber Security Degree students were able to attend right from UAT’s Cyber Cave on campus. Here’s what six hours of determination looks like! It actually looks like these guys had fun, too. Network Security Faculty Advisor Al Kelly said, “They were great at keeping services up, but need to work on Injects and Red Team Attack…

See Through Walls With Wi-Fi Devices

Superman See Through Walls with Wifi Devices




Cutting edge technology now gives Superman some competition. Scientists at MIT’s Computer Science and Artificial Intelligence Lab have developed a device that uses WiFi signals to effectively see through walls and other obstacles, with the ability to identify which persons are standing behind it. This new technology coined RF Capture, is enhanced version of previous methods of capturing movements across a house – technology used by mothers to see their baby’s breathing and firefighters to determine if there are survivors in a burning building. How does RF Capture work?  RF-Capture works by transmitting wireless signals that, upon hitting a person standing behind a wall,…

First Cyber Security Degree College in Arizona Marks 15 Years of Elite Graduates

Cyber Security Degree at UAT




Originating and leading cyber security degree education in Arizona, University of Advancing Technology (UAT) is marking 15 successful years since the inception of its elite Network Security degree program. The longest-running cyber security degree program in the state has prepared more graduates from a NSA- and CAE-credentialed education than any other university’s cyber program in Arizona. As a result, they have taken their place among the nation’s top cyber security professionals and help to meet growing demand that recently surpassed 200,000 job openings. Prior to cyber security becoming part of the U.S. vocabulary, UAT launched the Network Security degree, now…

Cyber Security Students Volunteer at Black Hat & DEF CON

Black Hat volunteers




A group of UAT Network Security students and alumni were given the chance to participate in Black Hat USA 2015 as paid volunteers and were also granted free access to DEF CON 23. Black Hat is a security conference designed to attract people of all walks of life such as corporate businesses, government agencies, military, the private sector and independent security experts. This year, Black Hat USA 2015 was held at the Mandalay Bay Resort and Casino in Las Vegas, from Aug. 1-6. Thanks to UAT Net Sec Professor Russ Rogers, UAT was the only university given the chance to…

DEF CON Talk Cancelled

proxyham-100596165-primary.idge




Each year at DEF CON, we receive a huge number of submissions. While most of them are interesting to some portion of our attendee population, there are normally a few talks that seem to have mass appeal. This year, DEF CON received a submission from Ben Caudill about a technology he had created, called Proxy Ham. The concept was simple; increase the anonymity and privacy of a user by creating a device that allows a remote connection that can’t easily be traced back to the user. The device was designed around a Raspberry Pi, and included wireless interfaces in the…

Cyber Security Degree Students Capture The Flag For Ethical Hackers

Network Security students learning skills in a Capture the Flag challenge




UAT Network Security students who belong to ethical hacking group ‘Layer8′ have began an intense 3-day worldwide challenge of Capture the Flag (CTF), hosted virtually in Milan, Italy. This is not your childhood game of hiding a red bandana from your opponent in the woods. This CTF requires the team to solve security-related challenges in Cryptography, Forensics, Reverse Engineering, Pwning (exploiting weaknesses), Web Hacking and a Grab Bag of miscellaneous tasks. The purpose of this CTF is to help security people look at problems differently and determine the techniques and skills that are needed industry wide. There are also prizes…

Recent TV Programing Correlates to UAT Degrees

battlebots




Television has recently shined a light on two exciting majors offered at University of Advancing Technology: Robotics and Embedded Systems and Network Security. You heard me right! Hit the DVR and let’s see what these shows are all about. BattleBots – Sundays at 9 p.m. on ABC The premise: The homemade robots will battle against each other, in a single elimination tournament style format, until there is just one champion. The new series promises to wow viewers with next generation robots—bigger, faster and stronger than ever before. The show will have a greater emphasis on the design and build elements…

Can We Understand Massive Security Data?

Matrix




Security software and technology are evolving rapidly, allowing security systems to collect and correlate more data about the inner workings of our network and computing systems, than ever before. But nearly no progress has been made in areas relevant to data visualization; which are key to allowing users to comprehend the vast amount of data collected. This puts at risk our ability to understand the key information required to make important decisions related to protecting our data assets. To put this simply, we’re using cutting edge technology to collect security data that we aren’t truly able to fully understand. Without…

Black Hat 2015

Black Hat 2015




Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. From its inception in 1997, Black Hat has grown…