October 17, 2018

Computer Forensic Degree

First Cyber Security Degree College in Arizona Marks 15 Years of Elite Graduates

Cyber Security Degree at UAT

Originating and leading cyber security degree education in Arizona, University of Advancing Technology (UAT) is marking 15 successful years since the inception of its elite Network Security degree program. The longest-running cyber security degree program in the state has prepared more graduates from a NSA- and CAE-credentialed education than any other university’s cyber program in Arizona. As a result, they have taken their place among the nation’s top cyber security professionals and help to meet growing demand that recently surpassed 200,000 job openings. Prior to cyber security becoming part of the U.S. vocabulary, UAT launched the Network Security degree, now…

Read More

Digital Forensic Students Learn Video Forensics

Digital Forensics

This semester the Digital Forensic students are learning video forensics. Keith Swanson, a Forensic Examiner for the Rocky Mountain Information Network, has been sharing his vast wealth of knowledge on video forensics with our students. The class is a perfect fit for our University because we have many other degrees that produce high quality video. Audio and video forensics provide a “real-time ” account of a crime. Video and audio evidence is becoming one of the most prevalent forms of forensic evidence used in both civil and criminal cases. Just look how quickly cell phone video gets posted to the Internet. As the demand for…

Read More

CISPA – Cyber Intelligence Sharing and Protection Act of 2011 as of April 16, 2012


There is still much controversy surrounding CISPA. Below is the link to the house bill that is being threatened to be vetoed by President Obama. The bill is aimed to sharing “Cyber Threat Information”. Defining the “Cyber Threat Information” is aimed at unauthorized access and malicious intentions. http://docs.house.gov/billsthisweek/20120423/CPRT-112-HPRT-RU00-HR3523.pdf ‘‘(2) CYBER THREAT INFORMATION — The term ‘cyber threat information’ means information directly pertaining to a vulnerability of, or threat to, a system or network of a government or private entity, including information pertaining to the protection of a system or network from— ‘‘(A) efforts to degrade, disrupt, or destroy such system…

Read More