April 24, 2018

Summer Sizzles with Cyber Security

Opportunities in Cyber Security heat up during the summer with well-known industry events like Black Hat and DEF CON! Each summer, UAT Cyber Security students can apply to work as paid volunteers at the iconic Black Hat Briefings in Las Vegas. No, they aren’t there to party! At Black Hat, they gain industry experience in setting up networks, WiFi connections, routers, switches, and much more. This internship alone can open so many doors for students looking to network and break into the industry upon graduation. The day after Black Hat ends, DEF CON begins and many students stick around to…

Cyber Security Alumni to Hold 2-Day Training at Black Hat Under New Startup Antimatter Security, LLC

Antimatter Security LLC

Cyber Security alumni have created a startup company for penetration testing called AntiMatter Security, LLC. The team consists of William Peterson (Network Security, Technology Forensics), Stephen Chicosky (Network Security, Network Engineering), Kenny Welch (Network Security), Roger Brambila (Network Security, Advancing Computer Science) and Roger Allen (Network Security, Advancing Computer Science) all who earned their degrees from UAT. These students have been to Black Hat Briefings as paid volunteers in the past. This year, they will return to the conference as trainers teaching two 2-day classes they developed called “Attacks Over GSM With Project Mayhem.” Participants will immerse themselves in the world…

What is Network Security?

What is Cyber Security

Blog co-written by UAT Cyber Security Program Champion Greg Miles and Digital Media Maven Lauren Fach Network security, or cyber security, is an industry where professionals are trained to prevent and monitor unauthorized access or attempts to access, misuse, or modify a computer network and network-accessible resources. A network can be private, like within a company, school, business, or home and is designed to keep users out that do not have the correct login credentials. Other networks may be open to public access; an example would be the free Wi-Fi at Starbucks or a hotel. Many Network Security pros will warn against using public Wi-Fi…

CCDC Qualifier This Saturday at UAT

Cyber Security Degree at UAT

Some very dedicated UAT Network Security students have been practicing as a team for the upcoming Western Regional Collegiate Cyber Defense Competition (WRCCDC) in March, but in order to reach the regionals, they first must qualify. The CCDC Qualifier takes place on Saturday, Jan. 27, and our students will compete from the Cyber Warfare Range on campus, from 10:30 a.m. – 4:30 p.m. “UAT is competing against over 16 other colleges and we are all Blue Teams, defending servers against the CCDC Red Team. They have practiced their skills for months and I wish them all good luck this Saturday,”…

AntiMatter Security Talk: Black Hat

AntiMatter Security Talk Black Hat Briefings

Last spring, five Cyber Security alumni created a startup company for penetration testing called AntiMatter Security, LLC. In previous years, these students volunteered at Black Hat Briefings as paid workers, but this year they returned to Black Hat as trainers teaching two 2-day classes they developed called “Attacks Over GSM With Project Mayhem.” The workshops taught participants new attack techniques to help defend networks and how to combine Red Team and Pen-tester prowess to create a less common attack tool, a device that participants will build at the training and can take home with them. With the new Project Mayhem…

V.A.S.T.

VAST-SIP

Data breaches, identity theft, phishing schemes and large scale hacks happen all day, every day. When solving cyber crimes, it’s challenging for a first responder to capture critical information from a computer at a crime scene in the heat of an investigation without the in-depth training that UAT Network Security students received. To solve this problem, Network Security alumni Will Peterson struck up a conversation with Professor Frank Griffiths, who teaches forensics at UAT and formerly worked for the Scottsdale District Attorney. Will and a four other Network Security put their heads together for their Student Innovation Project and created…

UAT’s Network Security Team Takes A Roadtrip To WRCCDC

UAT WRCCDC Qualifier Cyber Security students

UAT Cyber Security students have been prepping for the Western Regional Collegiate Cyber Defense Competition (WRCCDC) since last fall. They competed in the CCDC Virtual Qualifier in January 2017, finishing in 4th place, which secured them a spot at WRCCDC on March 24-26, 2017, at the Cal Poly Pomona Bronco Center. UAT students take this competition very seriously as there is a selection process for being accepted to UAT’s CCDC team. Keep in mind that UAT took 2nd place at 2016 WRCCDC. This being the 10th year of the NRCCDC, UAT would like to mirror that level of success in…

UAT Network Security Team Qualifies for Western Regional CCDC

UAT CCDC Team Qualifies for Regionals.jpg

UAT Cyber Security students finished in 4th place at the CCDC Virtual Qualifier over the weekend securing them a spot at Western Regional Collegiate Cyber Defense Competition (WRCCDC) on March 24-26, 2017, at the Cal Poly Pomona Bronco Center. UAT students are far from newbs to this competition, as UAT took 2nd place at 2016 WRCCDC. In the zone… UAT’s roster of 11 students including the eight selected participants and three alternates locked themselves in the Cyber Warfare Range an hour prior to competing, in order to brainstorm strategies, review items of interest, and discuss tactics if certain issues arise. It’s…

2016 Black Hat Briefings Conference

Black Hat

UAT Cyber Security students will return to Black Hat in a few weeks to serve as paid volunteers assisting with various activities at the conference such as network set up, security, event organization and tear down. Year after year, UAT students are fortunate to have an opportunity because no other technology colleges are granted this privilege. Black Hat is the most technical and relevant global information security event series in the world. For 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are…

UAT Network Security Experts Featured in Ransomware Story

Ransomware interview with Fox10 Phoenix and UAT Provost Dave Bolman

What is ransomware and how should one handle it? In the UAT Cyber Warfare Range, Provost Dr. Dave Bolman and ‎Network Security‬ Professor Al Kelly comment on ‪ransomware‬ and how to handle the threat in a FOX 10 Phoenix interview with special assignment reporters Kristy Siefkin and Tishin Donkersley.  Ransomware – a type of malware that can be covertly installed on a computer without the knowledge of the user which restricts access to the infected computer system and demands that the user pay a ransom to the malware operators to remove the restriction.  The topic of ransomware is frequently discussed in the news…