Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.
Required Fields Are Highlighted
University of Advancing Technology is an elite, private college that serves its student body by fostering knowledge creation and academic excellence in an environment that embraces the young technophiles of the world. With three centers of research and a suite of technology-centered undergraduate and graduate degrees, the University is a recognized leader in technology education.
Blog post by Adam Monk, Sales Director, Building Design Services, LLC In today’s market, whether you are selling cars, software, or real estate you need to pay more attention to your clients...
The results are in! Out of 17 teams competing in the CCDC Qualifier, UAT had to place 8th or better…
UAT placed 3rd overall and took 1st in the defense category. Congrats to this amazing group of dedicated Network Security students.
Currently UAT is the top Arizona College coming out of the 2018 CCDC Qualifier. Next stop is the regionals.
Here are the standings:
1 – Cal Poly Pomona
2 – Stanford Univ.
3 – University of Advancing Tech
4 – CSU Northridge
5 – UC Riverside
6 – San Diego State Univ.
7 – National Univ.
8 – Arizona State Univ.
UAT will be taking the big white van to the Regionals in March!
The UAT WRCCDC Team consists of Robert Thompson, Eric Dodge, Kelvin Ashton, Jeremy Bunce, Mitchell Blystone-Pemberton, Adam Morris, Jordan Rude and Luke Schloesser.
Team alternates include Josh Mikkelson, Ashley Pearson, Lily Spear and Jackson Nestler, who were in the room during the competition observing.
Co-written by Game Art and Animation Jorge Portillo and Digital Media Maven Lauren Fach Game Art and Animation (GAA) is a creative field in video game development. Without character art, would...
Blog co-written by UAT Cyber Security Program Champion Greg Miles and Digital Media Maven Lauren Fach
Network security, or cyber security, is an industry where professionals are trained to prevent and monitor unauthorized access or attempts to access, misuse, or modify a computer network and network-accessible resources.
A network can be private, like within a company, school, business, or home and is designed to keep users out that do not have the correct login credentials. Other networks may be open to public access; an example would be the free Wi-Fi at Starbucks or a hotel. Many Network Security pros will warn against using public Wi-Fi and that you are operating a device at your own risk knowing that the connection is unsecured.
Important to Remember:
Threat – Something that can impact the operation of an organization. There can be natural threats (fires, hurricanes, disasters) or human threats (bombs, malicious hackers, nation-states, etc.)
Vulnerability – a weakness in a person, place, or thing
Impact – the result that can affect an organization should something occur
Risk – The combined effect of the Threats, Vulnerabilities and Impact
Hacker – Someone who enjoys discovering how things work. Remember hackers can use their powers for good or for evil and it is all based on intent
Ethical Hacking – The process of discovering vulnerabilities to improve the security posture of an individual or organization
Black Hat – Hackers using their powers for evil. Also the name of one of the most renowned annual security conferences
White Hat – Hackers using their powers for good
Gray Hat – Hackers that can’t seem to decide whether they are good or evil
Penetration Test (PenTest) – The process of identifying vulnerabilities and their exploitability to help an organization improve their security posture
At UAT, a Bachelor of Science degree in cyber security prepares students for the rapid paced online world of theft and corruption of data and information. UAT teaches a broad range of topics to the support the security professional to include network defense, incident response, business continuity/disaster recovery, security and risk assessment, and penetration testing.
From the desk of Cyber Studies Program Champion Greg Miles…
In working as an industry Security Consultant, I saw many different security discoveries that had a significant impact on the client’s operations.
In my experience, the biggest threats for all organizations today are the complacency and actions of individuals within an organization. From an accidental opening of access to sensitive information to the intentional operation of an unauthorized or even illegal business, the employees can knowingly or not, cause the most damage.
As an industry professional, I work to help clients identify security risks and make improvements to their security posture through a combination of closing vulnerabilities and continuous monitoring of their business operations.
Industry conferences such as Black Hat and DEF CON are important to attend because:
• Knowledge Transfer – The best and the brightest bring the newest information to these conferences. You also get to see the latest tools and techniques.
• Networking – A chance to meet the people that are setting the future for our industry
• Resume Builder – Having work experience or teaching experience at these conferences are great talking points when searching for employment
UAT students are afforded the opportunity to work at paid volunteers each summer at Black Hat, with some being asked to stay and work as DEFCON Goons.
Cyber Security alumni formed startup AntiMatter Security post graduation held a 2-day training last summer at Black Hat that taught industry professionals about their product, the Project Mayhem Kit.
Find out if a career in network security is in your future.
The Student Innovation Project (SIP) Fair is a event to show off semesters of student’s hard work and innovative ideas. In preparation, students conduct extensive research and overcome challenges as...
Some very dedicated UAT Network Security students have been practicing as a team for the upcoming Western Regional Collegiate Cyber Defense Competition (WRCCDC) in March, but in order to reach the regionals, they first must qualify.
The CCDC Qualifier takes place on Saturday, Jan. 27, and our students will compete from the Cyber Warfare Range on campus, from 10:30 a.m. – 4:30 p.m.
“UAT is competing against over 16 other colleges and we are all Blue Teams, defending servers against the CCDC Red Team. They have practiced their skills for months and I wish them all good luck this Saturday,” said Professor Wayne Kibbe.
The UAT WRCCDC Team has the brightest and most dedicated Network Security students that UAT has to offer. Thank you to Robert Thompson, Eric Dodge, Kelvin Ashton, Jeremy Bunce, Mitchell Blystone-Pemberton, Adam Morris, Jordan Rude and Luke Schloesser for filling out the competing roster.
Team alternates include Josh Mikkelson, Ashley Pearson, Lily Spear and Jackson Nestler, who may be in the room during the competition to observe.
Good luck Blue Team!
Being a student can be a full-time job and for others enrolled in college, there may be other important external responsibilities such as jobs, families, and military obligations pulling them...
Join UAT Foundation and Warriors Heart in acknowledging Veterans Appreciation Day!
We know that active military, veterans, and first responders have a thirst to learn about technology.
This year, UAT is excited to host a Veterans Day Open House and Silent Auction Fundraiser on Thursday, Nov. 9, in an equal partnership formed between the UAT Foundation and Warriors Heart Foundation.
We invite any active military, veterans, and first responders to the Veterans Day Open House to celebrate our military locally and to learn more about cyber security. As a military-friendly school, UAT is excited to host a military-centric open house and information session for military personal interested in technology education.
This open house will offer prospective military students the opportunity to learn about our unique degree programs, tour our technology-infused campus, connect with faculty, learn about scholarships/financial aid, and meet with campus staff to see if UAT is a good fit for your future.
The service, dedication and sacrifices made by the men and women serving our nation in the United States military are recognized by University of Advancing Technology. Whether you are on active duty, are a reservist or are a veteran, UAT has a variety of program offerings, learning delivery options and financial aid opportunities that will allow you to achieve your educational goals in a way that meets your needs.
Whether you are seeking to advance in a civilian career, complement your military skills or pursue a fresh path in advancing technology, UAT is committed to your success.
UAT maintains ongoing relationships with several U.S. government organizations as a Center of Academic Excellence as designated by the National Security Agency and the Department of Homeland Security
Learn more about UAT’s Military Friendly School designation: http://www.uat.edu/military
The UAT Foundation is a scholarship foundation that seeks to locate and deliberately nurture individuals whose talents will make the world stronger through the creation of technology, ethically applied in society. Through scholarships designed to foster the learning of UAT students, the UAT Foundation exists to support the next generation of the change agents our world needs.
The Warriors Heart Foundation seeks to assist military, veterans and first responders in accessing PTSD, alcohol and chemical dependency treatment at Warriors Heart with a mission to provide treatment for those who put their lives on the line for our safety. The WH Foundation works tirelessly to assist those who put their lives on the line for us every day in their time of greatest need.
Your generous contribution will assist the University of Advancing Technology Foundation and the Warriors Heart Foundation in raising and award the funding that is critical to supporting our veterans and first responders into the next stage of their lives. Because both Foundations are 501(c)3 organizations, all donations are tax deductible.
Five UAT Game Studios students worked on a project called, “The Wall: Unknown Stories, Unintended Consequences,” under the leadership of USA TODAY NETWORK and The Arizona Republic. After 15 weeks...
Blog written by student Michael Bradley, UAT Network Security/ Network Engineering student
Network Security is a growing field and with the increase in cyber warfare, it’s not slowing down. There has been a call to arms for more qualified applicants to enter the job market.
Currently, one the main issues that we face is consumer privacy, which includes encryption, email privacy, and call privacy. There are a lack of consumer items on the market that can fulfill this security for its consumers. What I am currently brainstorming is a cellular device and laptop with the perfect level of privacy and secrecy. A device that not only fulfills the need for privacy but also gives the consumer confidence in the device they own.
Currently, the only phones on the market with this plan are either over-priced or nowhere near user-friendly. Here are two examples:
The main one that strikes out is the Blackphone 2. The Blackphone 2 has a great concept. It takes everything the user wants in privacy incorporated into the phone, however the encryption isn’t exactly the highest to be achieved and there were many holes found in the security protocol for the phone.
It’s wonderful when alumni return to UAT with good news! Evan Tappero who graduated last year with a degree in Game Design, gave us the scoop on the cool new...
UAT held the 2nd Annual Cyber Security Open House on Thursday, Oct. 12, in conjunction with the national cause, Cyber Security Awareness Month.
UAT Cyber Security professors Wayne Kibbe and Mason Galatas teamed up to present a slideshow on the basics of cyber security and how to protect yourself the best you can from hackers.
Professor Wayne Kibbe said, “Cyber Security education is very important for several reasons. First, the demand for cyber security skills is rapidly growing and US Labor Department reports claim shortages for the foreseeable future. Second, as more and more devices connect to the internet, the chances of individuals getting hacked is increasing. A career in the field could be very rewarding by protecting not only individual consumers, but private businesses and government agencies as well.”
Some important takeaways from the presentation include:
UAT Faculty to Teach EVIT’s Cyber Security Courses for College Credit UAT recognizes the deficit of skilled workers entering STEM careers and is proud to announce a partnership to kick...
UAT has led the way in cyber security since the late 90s, writing the rule books for cyber security education in Arizona.
Marking over 20 successful years since the inception of its elite Network Security degree program, UAT is proud to participate in Cyber Security Awareness Month, during the month of October, allowing our faculty of experts to share important information on cyber security with the public.
UAT recognizes the importance of training cyber security experts, in its students, alumni, faculty and in local members of the community.
We have compiled a few tips and anecdotes about our students below.
Want to know more about cyber security from UAT’s experts?
UAT is hosting a Cyber Security Open House on Oct. 12, with industry experts, faculty and alumni to offer tips on how to stay safe online and talk about the importance of Cyber Security education to the public.
Learn more about protecting yourself online. Dive into what it’s like working for the Cyber Security Industry. Celebrate Cyber Security Awareness month on October 12, with a full slate of activities, industry talks, and topics involving some of industry’s top professionals. Don’t miss out on this incredible educational event!
What: UAT Cyber Security Open House
When: Thursday, Oct. 12, from 6:30-8:30 p.m.
Where: University of Advancing Technology: 2625 W. Baseline Rd. Tempe, AZ 85283
Why: To celebrate Cyber Security Awareness Month and educate the public on tips to stay safe online.
RSVP on Eventbrite, space is limited.
See you on Thursday night!
Do you love video games? Our Game Studios students not only love to play games, but also spend a lot of time making them, too. Come see what UAT Game Studios...
Cactus Con is a local cyber convention that began in 2012 and has been growing each year. Considered to be Arizona’s Defcon, Cactus Con may be the biggest local/regional hacking, cybersecurity conference in Arizona – not to mention, it was started in part by UAT alumni.
This year Cactus Con will include a robotics village and organizers have asked UAT to run it. UAT Robotics Professor Joseph Horen will be on-hand at Cactus Con to show off robots, drones and answer questions about the program.
UAT will also bring Rasberry Pi and Arduino tech applications. The idea is to have a hands-on, interactive area where the kids and teens can experience building with this technology, including IoT devices and/or Bots that can be coded to do things.
UAT Network Security alumni and Antimatter Security COO Will Peterson said, “I can’t wait for this years’ Cactus Con! I’m happy to see professionals in local security groups getting involved in conferences and reaching out to the public. It’s great to have local talent collaborating for the better of our industry.”
What: Cactus Con
When: Saturday, September 30 from 8 a.m. to 4 p.m.
Where: Phoenix Convention Center
Cactus Con participants can attend a variety of workshops, presentations and break-out sessions. Some topics include Cloud computing, Covert communications, Cryptography, Incident response, Malware detection, Framework vulnerabilities, Mobile security, Network reconnaissance and Social engineering.
We hope to see you at Cactus Con on Sept. 30th!
It’s summer at UAT and not only do we keep campus cool with fun club events and activities at the UAT Founder’s Hall dorms, students enrolled in various Network Security and Cyber...
Last spring, five Cyber Security alumni created a startup company for penetration testing called AntiMatter Security, LLC.
In previous years, these students volunteered at Black Hat Briefings as paid workers, but this year they returned to Black Hat as trainers teaching two 2-day classes they developed called “Attacks Over GSM With Project Mayhem.”
The workshops taught participants new attack techniques to help defend networks and how to combine Red Team and Pen-tester prowess to create a less common attack tool, a device that participants will build at the training and can take home with them.
With the new Project Mayhem Kit, it’s easier to think like a hacker thinks, engaging in a live environment with an innovative attack tool that you will build and deploy. In this completely hands-on training, you will demonstrate your new abilities to hack air-gapped systems and bypass perimeter defenses over a GSM network.
The AntiMatter Security team would like to discuss their experience at this huge industry event, talk about how to navigate the industry and offer tips for current students.
Attend this event at UAT:
The AntiMatter Security team is made up of William Peterson (Network Security, Technology Forensics), Stephen Chicosky (Network Security, Network Engineering), Kenny Welch (Network Security), Roger Brambila (Network Security, Advancing Computer Science) and Roger Allen (Network Security, Advancing Computer Science).
Spec title sequence for the feature film The Perks of Being a Wallflower, created by student Charlotte Foley for DVA254 Motion Graphics class using Adobe After Effects. Related PostsNew DV...
Data breaches, identity theft, phishing schemes and large scale hacks happen all day, every day. When solving cyber crimes, it’s challenging for a first responder to capture critical information from a computer at a crime scene in the heat of an investigation without the in-depth training that UAT Network Security students received.
To solve this problem, Network Security alumni Will Peterson struck up a conversation with Professor Frank Griffiths, who teaches forensics at UAT and formerly worked for the Scottsdale District Attorney.
Will and a four other Network Security put their heads together for their Student Innovation Project and created a device called V.A.S.T., Volatile Data Acquisition System and Technology, an offensive forensics tool.
For example, if a police officer is at a crime scene serving a search warrant, V.A.S.T. gives them the ability to grab as much volatile data as possible from an open laptop in order to help solve a cyber crime before shutting down the computer.
Normally when a computer is powered down, all memory is erased from the temporary position in memory, meaning important evidence could be erased, leaving less evidence to use against a cyber criminal in court. Without V.A.S.T., anything not backed up would be lost if the system was shut down.
The idea is that any person at the civilian level or higher can provide immediate incident response without having any training or deep knowledge of Network Security.
Professor Frank Griffiths is impressed with the device and can see how V.A.S.T. could be extremely helpful in solving cyber crimes.
The team is interesting in further marketing and development on this innovative product.
The team consists of: William Peterson (Network Security/Technology Forensics), Nathanial Stringer (Network Security/Technology Forensics), Adam Brendan, Ian Guile (Advancing Computer Science/ Network Security), Arthur Miramontes (Network Security).