June 23, 2018

What is an Ethical Hacker?

Ethical Hackers are talented hackers who use their superpowers for good. In essence, hackers are smart people who want to understand how things work. They tear things down to their basic components—a process known as reverse engineering—to get a deep understanding of something. The term hacker is often misused or misunderstood in the media and in the community. There are actually three different types of hackers: white hats (the good guys), black hats (the bad guys) and gray hat (the guys who ride that good guy/bad guy line). If companies and organizations don’t understand how hackers can get into their…

5 Tips for Launching Your Cyber Security Career

We may hit 3.5 million unfilled cyber security jobs by 2021. That’s a lot of SOC analysts, network engineers, systems administrators, IT auditors and penetration testers. Education, business, government and community partners all recognize the cyber skills gap, but it’s still tough to get a job—or at least the job that you want. We asked University of Advancing Technology Cyber Security Program Champion Greg Miles to share his top tips for launching a successful career in cyber security. We also invited McKesson’s Head of Cyber Security Active Defense Lonnie Benavides to campus to share his industry insights with UAT students. Here are their…

Why You Should Study Blockchain

On April 27, 2018, North Korea and South Korea signed the Panmunjom Declaration for Peace, Prosperity and Unification of the Korean Peninsula. Two electronic versions—one in English and one in Korean—have been stored on the Ethereum blockchain. The energy industry alone has invested $1 billion in blockchain. And four of the world’s largest automakers want to put blockchain technology in your car. “Blockchain is right up there with the invention of the Internet,” said Damian Chung, Sr. Director of Cybersecurity Engineering and Development at Dignity Health. Chung thinks blockchain has the potential to revolutionize healthcare, empower businesses to bypass the middle man…

Summer Sizzles with Cyber Security

Opportunities in Cyber Security heat up during the summer with well-known industry events like Black Hat and DEF CON! Each summer, UAT Cyber Security students can apply to work as paid volunteers at the iconic Black Hat Briefings in Las Vegas. No, they aren’t there to party! At Black Hat, they gain industry experience in setting up networks, WiFi connections, routers, switches, and much more. This internship alone can open so many doors for students looking to network and break into the industry upon graduation. The day after Black Hat ends, DEF CON begins and many students stick around to…

Cyber Security Alumni to Hold 2-Day Training at Black Hat Under New Startup Antimatter Security, LLC

Antimatter Security LLC

Cyber Security alumni have created a startup company for penetration testing called AntiMatter Security, LLC. The team consists of William Peterson (Network Security, Technology Forensics), Stephen Chicosky (Network Security, Network Engineering), Kenny Welch (Network Security), Roger Brambila (Network Security, Advancing Computer Science) and Roger Allen (Network Security, Advancing Computer Science) all who earned their degrees from UAT. These students have been to Black Hat Briefings as paid volunteers in the past. This year, they will return to the conference as trainers teaching two 2-day classes they developed called “Attacks Over GSM With Project Mayhem.” Participants will immerse themselves in the world…

UAT CCDC Team Places 3rd, Qualifying for Regionals

2018 CCDC Qualifier

The results are in! Out of 17 teams competing in the CCDC Qualifier, UAT had to place 8th or better… UAT placed 3rd overall and took 1st in the defense category. Congrats to this amazing group of dedicated Network Security students. Currently UAT is the top Arizona College coming out of the 2018 CCDC Qualifier. Next stop is the regionals. Here are the standings: 1 – Cal Poly Pomona 2 – Stanford Univ. 3 – University of Advancing Tech 4 – CSU Northridge 5 – UC Riverside 6 – San Diego State Univ. 7 – National Univ. 8 – Arizona…

What is Network Security?

What is Cyber Security

Blog co-written by UAT Cyber Security Program Champion Greg Miles and Digital Media Maven Lauren Fach Network security, or cyber security, is an industry where professionals are trained to prevent and monitor unauthorized access or attempts to access, misuse, or modify a computer network and network-accessible resources. A network can be private, like within a company, school, business, or home and is designed to keep users out that do not have the correct login credentials. Other networks may be open to public access; an example would be the free Wi-Fi at Starbucks or a hotel. Many Network Security pros will warn against using public Wi-Fi…

CCDC Qualifier This Saturday at UAT

Cyber Security Degree at UAT

Some very dedicated UAT Network Security students have been practicing as a team for the upcoming Western Regional Collegiate Cyber Defense Competition (WRCCDC) in March, but in order to reach the regionals, they first must qualify. The CCDC Qualifier takes place on Saturday, Jan. 27, and our students will compete from the Cyber Warfare Range on campus, from 10:30 a.m. – 4:30 p.m. “UAT is competing against over 16 other colleges and we are all Blue Teams, defending servers against the CCDC Red Team. They have practiced their skills for months and I wish them all good luck this Saturday,”…

Security on Consumer Handhelds

security on consumer handhelds and cell phones

Blog written by student Michael Bradley, UAT Network Security/ Network Engineering student Network Security is a growing field and with the increase in cyber warfare, it’s not slowing down. There has been a call to arms for more qualified applicants to enter the job market. Currently, one the main issues that we face is consumer privacy, which includes encryption, email privacy, and call privacy. There are a lack of consumer items on the market that can fulfill this security for its consumers. What I am currently brainstorming is a cellular device and laptop with the perfect level of privacy and…

Cactus Con 2017

cactus con 2017 cyber security conference in arizona

Cactus Con is a local cyber convention that began in 2012 and has been growing each year. Considered to be Arizona’s Defcon, Cactus Con may be the biggest local/regional hacking, cybersecurity conference in Arizona – not to mention, it was started in part by UAT alumni. This year Cactus Con will include a robotics village and organizers have asked UAT to run it. UAT Robotics Professor Joseph Horen will be on-hand at Cactus Con to show off robots, drones and answer questions about the program. UAT will also bring Rasberry Pi and Arduino tech applications. The idea is to have…