February 21, 2018

UAT CCDC Team Places 3rd, Qualifying for Regionals

2018 CCDC Qualifier

The results are in! Out of 17 teams competing in the CCDC Qualifier, UAT had to place 8th or better… UAT placed 3rd overall and took 1st in the defense category. Congrats to this amazing group of dedicated Network Security students. Currently UAT is the top Arizona College coming out of the 2018 CCDC Qualifier. Next stop is the regionals. Here are the standings: 1 – Cal Poly Pomona 2 – Stanford Univ. 3 – University of Advancing Tech 4 – CSU Northridge 5 – UC Riverside 6 – San Diego State Univ. 7 – National Univ. 8 – Arizona…

What is Network Security?

What is Cyber Security

Blog co-written by UAT Cyber Security Program Champion Greg Miles and Digital Media Maven Lauren Fach Network security, or cyber security, is an industry where professionals are trained to prevent and monitor unauthorized access or attempts to access, misuse, or modify a computer network and network-accessible resources. A network can be private, like within a company, school, business, or home and is designed to keep users out that do not have the correct login credentials. Other networks may be open to public access; an example would be the free Wi-Fi at Starbucks or a hotel. Many Network Security pros will warn against using public Wi-Fi…

CCDC Qualifier This Saturday at UAT

Cyber Security Degree at UAT

Some very dedicated UAT Network Security students have been practicing as a team for the upcoming Western Regional Collegiate Cyber Defense Competition (WRCCDC) in March, but in order to reach the regionals, they first must qualify. The CCDC Qualifier takes place on Saturday, Jan. 27, and our students will compete from the Cyber Warfare Range on campus, from 10:30 a.m. – 4:30 p.m. “UAT is competing against over 16 other colleges and we are all Blue Teams, defending servers against the CCDC Red Team. They have practiced their skills for months and I wish them all good luck this Saturday,”…

Security on Consumer Handhelds

security on consumer handhelds and cell phones

Blog written by student Michael Bradley, UAT Network Security/ Network Engineering student Network Security is a growing field and with the increase in cyber warfare, it’s not slowing down. There has been a call to arms for more qualified applicants to enter the job market. Currently, one the main issues that we face is consumer privacy, which includes encryption, email privacy, and call privacy. There are a lack of consumer items on the market that can fulfill this security for its consumers. What I am currently brainstorming is a cellular device and laptop with the perfect level of privacy and…

Cactus Con 2017

cactus con 2017 cyber security conference in arizona

Cactus Con is a local cyber convention that began in 2012 and has been growing each year. Considered to be Arizona’s Defcon, Cactus Con may be the biggest local/regional hacking, cybersecurity conference in Arizona – not to mention, it was started in part by UAT alumni. This year Cactus Con will include a robotics village and organizers have asked UAT to run it. UAT Robotics Professor Joseph Horen will be on-hand at Cactus Con to show off robots, drones and answer questions about the program. UAT will also bring Rasberry Pi and Arduino tech applications. The idea is to have…

AntiMatter Security Talk: Black Hat

AntiMatter Security Talk Black Hat Briefings

Last spring, five Cyber Security alumni created a startup company for penetration testing called AntiMatter Security, LLC. In previous years, these students volunteered at Black Hat Briefings as paid workers, but this year they returned to Black Hat as trainers teaching two 2-day classes they developed called “Attacks Over GSM With Project Mayhem.” The workshops taught participants new attack techniques to help defend networks and how to combine Red Team and Pen-tester prowess to create a less common attack tool, a device that participants will build at the training and can take home with them. With the new Project Mayhem…

V.A.S.T.

VAST-SIP

Data breaches, identity theft, phishing schemes and large scale hacks happen all day, every day. When solving cyber crimes, it’s challenging for a first responder to capture critical information from a computer at a crime scene in the heat of an investigation without the in-depth training that UAT Network Security students received. To solve this problem, Network Security alumni Will Peterson struck up a conversation with Professor Frank Griffiths, who teaches forensics at UAT and formerly worked for the Scottsdale District Attorney. Will and a four other Network Security put their heads together for their Student Innovation Project and created…

UAT Partners with East Valley Institute of Technology (EVIT) To Offer 2-Year Cyber Security Program

EVIT cyber security partnership with University of Advancing Technology

UAT Faculty to Teach EVIT’s Cyber Security Courses for College Credit UAT recognizes the deficit of skilled workers entering STEM careers and is proud to announce a partnership to kick off this fall with East Valley Institute of Technology (EVIT), a local technology institute for high school students. The EVIT partnership will offer a new High School Cyber Security Program under the guidance of UAT Cyber Security Program Champion, Dr. Greg Miles, who will provide the curriculum and support in the training of EVIT Faculty. EVIT students who successfully complete the High School Cyber Security Program will earn 12 college…

Computer Science Student Ups His Personal Security With YubiKey

YubiKey

There are “hackers” at any college but especially at UAT, where some of the best Network Security, Technology Forensics, Network Engineering and Information Assurance students in the state receive their education. That’s why Advancing Computer Science student Christopher Peterson decided to get secure with his logins. He uses a product called YubiKey, which looks like a small thumb drive that you plug into your computer and it generates a unique, 44-digit, single-use passcode that provides a second line of security for your logins, beyond a username and password. “I started using it because I was going to college and their…

See UAT’s Booth at DEF CON 25

DEF CON 25

Once the Black Hat Briefings come to an end, some UAT student volunteers will report as workers at DEF CON! Because both security conferences fall on the same week, in the same city, many people attend both Black Hat and DEF CON. UAT has a large presence at DEF CON with a huge booth located at Caesar’s Palace where attendees can learn more about cyber security, our bachelor and master’s degrees and check out some cool, nerd swag. DEF CON is more edgy than Black Hat, as it was created in 1993 by a core hacker group who wanted to…