October 21, 2018

First Cyber Security Degree College in Arizona Marks 15 Years of Elite Graduates

Cyber Security Degree at UAT

Originating and leading cyber security degree education in Arizona, University of Advancing Technology (UAT) is marking 15 successful years since the inception of its elite Network Security degree program. The longest-running cyber security degree program in the state has prepared more graduates from a NSA- and CAE-credentialed education than any other university’s cyber program in Arizona. As a result, they have taken their place among the nation’s top cyber security professionals and help to meet growing demand that recently surpassed 200,000 job openings. Prior to cyber security becoming part of the U.S. vocabulary, UAT launched the Network Security degree, now…

Cyber Security Students Volunteer at Black Hat & DEF CON

Black Hat volunteers

A group of UAT Network Security students and alumni were given the chance to participate in Black Hat USA 2015 as paid volunteers and were also granted free access to DEF CON 23. Black Hat is a security conference designed to attract people of all walks of life such as corporate businesses, government agencies, military, the private sector and independent security experts. This year, Black Hat USA 2015 was held at the Mandalay Bay Resort and Casino in Las Vegas, from Aug. 1-6. Thanks to UAT Net Sec Professor Russ Rogers, UAT was the only university given the chance to…

DEF CON Talk Cancelled

Each year at DEF CON, we receive a huge number of submissions. While most of them are interesting to some portion of our attendee population, there are normally a few talks that seem to have mass appeal. This year, DEF CON received a submission from Ben Caudill about a technology he had created, called Proxy Ham. The concept was simple; increase the anonymity and privacy of a user by creating a device that allows a remote connection that can’t easily be traced back to the user. The device was designed around a Raspberry Pi, and included wireless interfaces in the…

Cyber Security Degree Students Capture The Flag For Ethical Hackers

Network Security students learning skills in a Capture the Flag challenge

UAT Network Security students who belong to ethical hacking group ‘Layer8’ have began an intense 3-day worldwide challenge of Capture the Flag (CTF), hosted virtually in Milan, Italy. This is not your childhood game of hiding a red bandana from your opponent in the woods. This CTF requires the team to solve security-related challenges in Cryptography, Forensics, Reverse Engineering, Pwning (exploiting weaknesses), Web Hacking and a Grab Bag of miscellaneous tasks. The purpose of this CTF is to help security people look at problems differently and determine the techniques and skills that are needed industry wide. There are also prizes…

5 Things You May Not Know About DEF CON

DEF CON

DEF CON is one of the world’s largest annual hacker conventions, held every year in Las Vegas, since its inception in June 1993. The special sauce to DEF CON is that growth is largely organic and unplanned. As the conference has evolved, DEF CON has adopted the input and great ideas for content and events from many of the attendees and staff. DEF CON attendees can expect to see computer security professionals, journalists, lawyers, federal government employees, security researchers, and hackers interested in computer architecture, phone phreaking, hardware modification, and anything else that can be “cracked.” The event consists of…

Recent TV Programing Correlates to UAT Degrees

battlebots

Television has recently shined a light on two exciting majors offered at University of Advancing Technology: Robotics and Embedded Systems and Network Security. You heard me right! Hit the DVR and let’s see what these shows are all about. BattleBots – Sundays at 9 p.m. on ABC The premise: The homemade robots will battle against each other, in a single elimination tournament style format, until there is just one champion. The new series promises to wow viewers with next generation robots—bigger, faster and stronger than ever before. The show will have a greater emphasis on the design and build elements…

Volunteers Needed For Black Hat Briefings This Summer

Black Hat 2015

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world – from the corporate and government sectors to academic and even underground researchers. Black Hat remains the best and biggest event of its kind, unique in its ability to define tomorrow’s information security landscape. Black Hat is being held at Mandalay Bay in Las Vegas, from Aug. 1-6, 2015. UAT Students can get the experience of a lifetime by applying to volunteer at Black Hat this year. Click this link to submit your application: https://cfp.blackhat.com/volunteers/new This is…

Can We Understand Massive Security Data?

Security software and technology are evolving rapidly, allowing security systems to collect and correlate more data about the inner workings of our network and computing systems, than ever before. But nearly no progress has been made in areas relevant to data visualization; which are key to allowing users to comprehend the vast amount of data collected. This puts at risk our ability to understand the key information required to make important decisions related to protecting our data assets. To put this simply, we’re using cutting edge technology to collect security data that we aren’t truly able to fully understand. Without…

Hacking: A Career Or A Lifestyle?

Cyber Security Cave

Your success within information security is ultimately tied to your own dedication to the topic. In other words, if you’re not hacking in your free time, you’re not living up to your potential. In an odd twist, what you do in your free time really DOES impact your success in your work time. Let’s look at it this way. A student attends University in a effort to create a career they will hopefully enjoy, and benefit from. And it’s true, a University degree does offer tremendous value, even in the field of information security. But, in truth, Universities are often…

Be a Cynic

I typically try to be open-minded, and give people the benefit of the doubt. Seriously, I could be wrong, right? I get that. But when it comes to companies that have been hacked, and I’m listening to the story I’m being spoon-fed by their PR department; I’m a cynic. I imagine I always will be, actually. This comes up because of the recent JP Morgan Chase hack, where a purported 76 million households have had their information compromised. The story starts to fall apart each time the company says anything else about the incident, and how widespread the impact is…