October 20, 2017

See UAT’s Booth at DEF CON 25

DEF CON 25

Once the Black Hat Briefings come to an end, some UAT student volunteers will report as workers at DEF CON! Because both security conferences fall on the same week, in the same city, many people attend both Black Hat and DEF CON. UAT has a large presence at DEF CON with a huge booth located at Caesar’s Palace where attendees can learn more about cyber security, our bachelor and master’s degrees and check out some cool, nerd swag. DEF CON is more edgy than Black Hat, as it was created in 1993 by a core hacker group who wanted to…

Black Hat 2017

Black Hat

UAT Network Security students and alumni are preparing to work as paid volunteers for Black Hat USA 2017, taking place at Mandalay Bay Hotel and Casino in Las Vegas on July 22-27. Black Hat is a security conference designed for people of backgrounds like corporations, government agencies, military, the private sector and independent security experts. UAT is the primary university given the chance to volunteer at Black Hat, as our students have earned an outstanding track record over the years. At Black Hat, students help with tasks such as setting up networks, placing network cables down, setting up APs (access…

Congrats to UAT’s Cyber Security Teams

UAT's Cyber Security Team for WRCCDC

It’s been a busy couple of weeks for UAT’s Cyber Security students. A team of students competed at 2017 Western Regional Collegiate Cyber Defense Competition (WRCCDC) at Cal Poly Pomona, taking 4th place over schools like UC Berkeley, UC Riverside and ASU the weekend of March 24-26. Cyber Security Professor Wayne Kibbe escorted the team as their faculty coach, chaperoning the roadtrip for the competition. Professor Kibbe said, “Our team had an amazing amount of talent. These students take our security courses but in addition hold workshops most weekends to practice and hone their skills. I’m very proud of their…

2017 Cisco IOT Network Challenge

This weekend at UAT, teams of technology students will compete in a simulation that tests real world networking, security, and consulting skills to deploy an IoT solution for a simulated customer. Each team will act as an IT consulting firm that has been hired by a business to implement a new IoT solution at some of their remote sites. Responsibilities will include the design and implementation of a secure network at the remote site to support the connectivity of an “Internet of Things” endpoint (in this case a Raspberry Pi 3 configured as sensor with an embedded web server) that…

12 Network Security “White Hat” Hackers You Should Know

White Hat Hackers

The White Hat Heroes that walk among us are the cyber security experts who are looking for trouble. “White Hat” network security researchers are considered ethical hackers whose discoveries and inventions protect and defend against the underground “Black Hat” hackers. Thank you Network World for getting the word out that there are more than one kind of hacker out there. Robert “RSnake” Hansen Greg Hoglund Dan Kaminsky Zane Lackey Marc Maiffret Charlie Miller HD Moore Joanna Rutkowska Sherri Sparks Joe Stewart Christopher Tarnovsky Dino Dao Zovi Read more in this NetworkWorld article. To learn how to become a “white hat” hacker, go…