Cyber Security Feed

UAT, graduating cyber warriors since 2000

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

Required Fields Are Highlighted

When do you plan on attending?

University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.

Need assistance with this form?

University of Advancing Technology is an elite, private college that serves its student body by fostering knowledge creation and academic excellence in an environment that embraces the young technophiles of the world. With three centers of research and a suite of technology-centered undergraduate and graduate degrees, the University is a recognized leader in technology education.

Learn More About UAT

    Summer Sizzles with Cyber Security

    Summer Sizzles with Cyber Security

    (Feb 26, 2018)

    Students, you have 48 hours. The mission is to include one specific prop and one required line of dialog in your film. Now, go make a movie! UAT Digital Video...

    Opportunities in Cyber Security heat up during the summer with well-known industry events like Black Hat and DEF CON!

    Each summer, UAT Cyber Security students can apply to work as paid volunteers at the iconic Black Hat Briefings in Las Vegas. No, they aren’t there to party! At Black Hat, they gain industry experience in setting up networks, WiFi connections, routers, switches, and much more. This internship alone can open so many doors for students looking to network and break into the industry upon graduation.

    The day after Black Hat ends, DEF CON begins and many students stick around to attend or work at DEF CON, as well. Occasionally some lucky students who showed promise at Black Hat have been asked to work as DEF CON Goons, aka security, which is an honored privilege.

    DEF CON is full of hacking activities like Capture the Flag (CTF), Pentesting, and the Lock Picking Village as well as vendors and companies from all aspects of the Cyber Security world. While at Black Hat or DEF CON, students may find solid job opportunities by simply immersing themselves in the industry and networking with professionals in the field. Don’t miss out!

    read more
    Cyber Security Alumni to Hold 2-Day Training at Black Hat Under New Startup Antimatter Security, LLC

    Cyber Security Alumni to Hold 2-Day Training at Black Hat Under New Startup Antimatter Security, LLC

    (Feb 22, 2018)

    Some very dedicated UAT Network Security students have been practicing as a team for the upcoming Western Regional Collegiate Cyber Defense Competition (WRCCDC) in March, but in order to reach...

    Cyber Security alumni have created a startup company for penetration testing called AntiMatter Security, LLC.

    The team consists of William Peterson (Network Security, Technology Forensics), Stephen Chicosky (Network Security, Network Engineering), Kenny Welch (Network Security), Roger Brambila (Network Security, Advancing Computer Science) and Roger Allen (Network Security, Advancing Computer Science) all who earned their degrees from UAT. These students have been to Black Hat Briefings as paid volunteers in the past. This year, they will return to the conference as trainers teaching two 2-day classes they developed called “Attacks Over GSM With Project Mayhem.”

    Attacks over GSM with Project Mayhem at Black Hat

    Participants will immerse themselves in the world of hacking while learning new attack techniques to help defend networks. They will also learn to combine Red Team and Pen-tester prowess to create a less common attack tool, a device that participants will build at the training and can take home with them. With the new Project Mayhem Kit, it’s easier to think like a hacker thinks, engaging in a live environment with an innovative attack tool that you will build and deploy. In this completely hands-on training, you will demonstrate your new abilities to hack air-gapped systems and bypass perimeter defenses over a GSM network.

    A lot of credible information will be disseminated at the training including the following topics: Configuring Mayhem Kit, Basic Scripting Logic, Windows Exploitation, Linux Exploitation, Bypassing Perimeter Defense Systems, Social Engineering Concepts, Covert Concealment and Placement Techniques, Red Team Activity, Data Extraction, Isolating and Exploiting the Target and more.

    The training sessions are already sold out. More information on the class can be found here.

    You can also purchase a cool baseball hat to support Antimatter Security.

    Antimatter Security, LLC swag for sale.

    Antimatter Security, LLC swag for sale. Get yours today!

    Help spread the word. Like Antimatter Security on Facebook!


    read more
    UAT CCDC Team Places 3rd, Qualifying for Regionals

    UAT CCDC Team Places 3rd, Qualifying for Regionals

    (Feb 05, 2018)

    It’s the time of year again! UAT is excited once again to participate and sponsor Tempe Geeks Night Out. UAT will have lots of cool tech to show off such...

    The results are in! Out of 17 teams competing in the CCDC Qualifier, UAT had to place 8th or better…

    UAT placed 3rd overall and took 1st in the defense category. Congrats to this amazing group of dedicated Network Security students.

    Currently UAT is the top Arizona College coming out of the 2018 CCDC Qualifier. Next stop is the regionals.

    Here are the standings:

    1 – Cal Poly Pomona
    2 – Stanford Univ.
    3 – University of Advancing Tech
    4 – CSU Northridge
    5 – UC Riverside
    6 – San Diego State Univ.
    7 – National Univ.
    8 – Arizona State Univ.

    UAT will be taking the big white van to the Regionals in March!

    The UAT WRCCDC Team consists of Robert Thompson, Eric Dodge, Kelvin Ashton, Jeremy Bunce, Mitchell Blystone-Pemberton, Adam Morris, Jordan Rude and Luke Schloesser.

    Team alternates include Josh Mikkelson, Ashley Pearson, Lily Spear and Jackson Nestler, who were in the room during the competition observing.

    read more
    What is Network Security?

    What is Network Security?

    (Feb 01, 2018)

    UAT Game Studios students and alumni from Monster Vault Entertainment Studio will demo a VR snowball fight game called Chill Out, at Arizona Tech Council’s Tech the Hall’s After5 Tech...

    Blog co-written by UAT Cyber Security Program Champion Greg Miles and Digital Media Maven Lauren Fach

    Network security, or cyber security, is an industry where professionals are trained to prevent and monitor unauthorized access or attempts to access, misuse, or modify a computer network and network-accessible resources.

    A network can be private, like within a company, school, business, or home and is designed to keep users out that do not have the correct login credentials. Other networks may be open to public access; an example would be the free Wi-Fi at Starbucks or a hotel. Many Network Security pros will warn against using public Wi-Fi and that you are operating a device at your own risk knowing that the connection is unsecured.

    Important to Remember:

    • No network is 100% secure, even a private network with the best security features can have vulnerabilities and there is the human factor, that either knowingly or not can be manipulated.
    • Public networks should only be used for non-sensitive access. For example, it is NOT recommended to access your banking information from Starbucks. Public networks are easier to “eavesdrop” on and users should change their passwords frequently, especially when using public networks often.
    • Talk with your IT department about additional security features you might be able to access while out and about. For example, virtual private networks (VPN) can provide additional protections.
    • It isn’t all about the technical side of security either. Remember to protect your computing devices from theft and compromise. Lock the screen, don’t leave the computer at the table for even a second. Thieves are quick.
    Cyber Security Warfare Range at UAT

    Cyber Security Warfare Range at UAT

    Glossary of Cyber Security Terms

    Threat – Something that can impact the operation of an organization. There can be natural threats (fires, hurricanes, disasters) or human threats (bombs, malicious hackers, nation-states, etc.)

    Vulnerability – a weakness in a person, place, or thing

    Impact – the result that can affect an organization should something occur

    Risk – The combined effect of the Threats, Vulnerabilities and Impact

    Hacker – Someone who enjoys discovering how things work. Remember hackers can use their powers for good or for evil and it is all based on intent

    Ethical Hacking – The process of discovering vulnerabilities to improve the security posture of an individual or organization

    Black Hat – Hackers using their powers for evil. Also the name of one of the most renowned annual security conferences

    White Hat – Hackers using their powers for good

    Gray Hat – Hackers that can’t seem to decide whether they are good or evil

    Penetration Test (PenTest) – The process of identifying vulnerabilities and their exploitability to help an organization improve their security posture

    At UAT, a Bachelor of Science degree in cyber security prepares students for the rapid paced online world of theft and corruption of data and information. UAT teaches a broad range of topics to the support the security professional to include network defense, incident response, business continuity/disaster recovery, security and risk assessment, and penetration testing.

    You can learn more about a bachelor’s degree in Network Security. Ready to take the next step? UAT offers a master’s program in Cyber Security to elevate your knowledge of ethical hacking.

    Dr Greg Miles Cyber Security at UAT

    Dr. Greg Miles, Cyber Security at UAT

    From the desk of Cyber Studies Program Champion Greg Miles…

    In working as an industry Security Consultant, I saw many different security discoveries that had a significant impact on the client’s operations.

    In my experience, the biggest threats for all organizations today are the complacency and actions of individuals within an organization. From an accidental opening of access to sensitive information to the intentional operation of an unauthorized or even illegal business, the employees can knowingly or not, cause the most damage.

    As an industry professional, I work to help clients identify security risks and make improvements to their security posture through a combination of closing vulnerabilities and continuous monitoring of their business operations.

    AntiMatter Security at Black Hat Briefings

    AntiMatter Security at Black Hat Briefings

    Industry conferences such as Black Hat and DEF CON are important to attend because:
    • Knowledge Transfer – The best and the brightest bring the newest information to these conferences. You also get to see the latest tools and techniques.
    • Networking – A chance to meet the people that are setting the future for our industry
    • Resume Builder – Having work experience or teaching experience at these conferences are great talking points when searching for employment

    UAT students are afforded the opportunity to work at paid volunteers each summer at Black Hat, with some being asked to stay and work as DEFCON Goons.

    Cyber Security alumni formed startup AntiMatter Security post graduation held a 2-day training last summer at Black Hat that taught industry professionals about their product, the Project Mayhem Kit.

    Find out if a career in network security is in your future.

    read more
    CCDC Qualifier This Saturday at UAT

    CCDC Qualifier This Saturday at UAT

    (Jan 25, 2018)

    Back in 2016, UAT’s Digital Video Program teamed up with repeat collaborator Ayman Samman to produce a short film inspired by the “Arab Spring,” called “Toppled.” Samman, who starred in...

    Some very dedicated UAT Network Security students have been practicing as a team for the upcoming Western Regional Collegiate Cyber Defense Competition (WRCCDC) in March, but in order to reach the regionals, they first must qualify.

    The CCDC Qualifier takes place on Saturday, Jan. 27, and our students will compete from the Cyber Warfare Range on campus, from 10:30 a.m. – 4:30 p.m.

    “UAT is competing against over 16 other colleges and we are all Blue Teams, defending servers against the CCDC Red Team. They have practiced their skills for months and I wish them all good luck this Saturday,” said Professor Wayne Kibbe.

    The UAT WRCCDC Team has the brightest and most dedicated Network Security students that UAT has to offer. Thank you to Robert Thompson, Eric Dodge, Kelvin Ashton, Jeremy Bunce, Mitchell Blystone-Pemberton, Adam Morris, Jordan Rude and Luke Schloesser for filling out the competing roster.

    Team alternates include Josh Mikkelson, Ashley Pearson, Lily Spear and Jackson Nestler, who may be in the room during the competition to observe.

    Good luck Blue Team!

    read more
    Veterans Day Celebration at UAT

    Veterans Day Celebration at UAT

    (Nov 01, 2017)

    UAT attended CactusCon 2017 in the Robotics Village on Saturday, October 1, at Phoenix Convention Center. UAT Professor Joseph Horen showed off robot demonstrations as well as Arduino programming labs...

    Join UAT Foundation and Warriors Heart in acknowledging Veterans Appreciation Day!

    We know that active military, veterans, and first responders have a thirst to learn about technology.

    This year, UAT is excited to host a Veterans Day Open House and Silent Auction Fundraiser on Thursday, Nov. 9, in an equal partnership formed between the UAT Foundation and Warriors Heart Foundation.

    We invite any active military, veterans, and first responders to the Veterans Day Open House to celebrate our military locally and to learn more about cyber security. As a military-friendly school, UAT is excited to host a military-centric open house and information session for military personal interested in technology education.

    This open house will offer prospective military students the opportunity to learn about our unique degree programs, tour our technology-infused campus, connect with faculty, learn about scholarships/financial aid, and meet with campus staff to see if UAT is a good fit for your future.

    The service, dedication and sacrifices made by the men and women serving our nation in the United States military are recognized by University of Advancing Technology. Whether you are on active duty, are a reservist or are a veteran, UAT has a variety of program offerings, learning delivery options and financial aid opportunities that will allow you to achieve your educational goals in a way that meets your needs.

    Whether you are seeking to advance in a civilian career, complement your military skills or pursue a fresh path in advancing technology, UAT is committed to your success.

    UAT maintains ongoing relationships with several U.S. government organizations as a Center of Academic Excellence as designated by the National Security Agency and the Department of Homeland Security

    • UAT is a member of the Arizona Veterans Association
    • UAT is proud of its designation as a Military Friendly School
    • GI Bill and Yellow Ribbon approved
    • UAT has dedicated staff and resources that will allow you to work through the application, admissions and enrollment processes, as well as help you find available funding for your education

    Learn more about UAT’s Military Friendly School designation:

    The UAT Foundation is a scholarship foundation that seeks to locate and deliberately nurture individuals whose talents will make the world stronger through the creation of technology, ethically applied in society. Through scholarships designed to foster the learning of UAT students, the UAT Foundation exists to support the next generation of the change agents our world needs.

    The Warriors Heart Foundation seeks to assist military, veterans and first responders in accessing PTSD, alcohol and chemical dependency treatment at Warriors Heart with a mission to provide treatment for those who put their lives on the line for our safety. The WH Foundation works tirelessly to assist those who put their lives on the line for us every day in their time of greatest need.

    Your generous contribution will assist the University of Advancing Technology Foundation and the Warriors Heart Foundation in raising and award the funding that is critical to supporting our veterans and first responders into the next stage of their lives. Because both Foundations are 501(c)3 organizations, all donations are tax deductible.

    read more
    Security on Consumer Handhelds

    Security on Consumer Handhelds

    (Oct 23, 2017)

    Many UAT students will become entrepreneurs and start their own businesses after graduation. Professor Mark Smith teaches Business Technology courses at UAT and has some great tips for how to...

    Blog written by student Michael Bradley, UAT Network Security/ Network Engineering student

    Network Security is a growing field and with the increase in cyber warfare, it’s not slowing down. There has been a call to arms for more qualified applicants to enter the job market.

    Currently, one the main issues that we face is consumer privacy, which includes encryption, email privacy, and call privacy. There are a lack of consumer items on the market that can fulfill this security for its consumers. What I am currently brainstorming is a cellular device and laptop with the perfect level of privacy and secrecy. A device that not only fulfills the need for privacy but also gives the consumer confidence in the device they own.

    Currently, the only phones on the market with this plan are either over-priced or nowhere near user-friendly. Here are two examples:

    KryptAll Secure Encrypted TSCM Counter Surveillance iPhone 7 w/ No Call Records

    KryptAll Secure Encrypted TSCM Counter Surveillance iPhone 7


    Blackphone 2

    Blackphone 2

    The main one that strikes out is the Blackphone 2. The Blackphone 2 has a great concept. It takes everything the user wants in privacy incorporated into the phone, however the encryption isn’t exactly the highest to be achieved and there were many holes found in the security protocol for the phone.

    read more
    UAT Hosted 2nd Annual Cyber Security Open House

    UAT Hosted 2nd Annual Cyber Security Open House

    (Oct 16, 2017)

    It’s almost back to school time and UAT will be welcoming lots of new faces to campus. Being a new student on campus is exciting, but can be intimidating. That’s...

    UAT held the 2nd Annual Cyber Security Open House on Thursday, Oct. 12, in conjunction with the national cause, Cyber Security Awareness Month.

    UAT Cyber Security professors Wayne Kibbe and Mason Galatas teamed up to present a slideshow on the basics of cyber security and how to protect yourself the best you can from hackers.

    Professor Wayne Kibbe said, “Cyber Security education is very important for several reasons. First, the demand for cyber security skills is rapidly growing and US Labor Department reports claim shortages for the foreseeable future. Second, as more and more devices connect to the internet, the chances of individuals getting hacked is increasing. A career in the field could be very rewarding by protecting not only individual consumers, but private businesses and government agencies as well.”

    Some important takeaways from the presentation include:

    • Online shopping is a risk – make sure to use credit cards versus debit cards due to extra built-in protection from credit card companies. Gift cards are even more secure.
    • Social media can give away too much personal information. Avoid sharing your address, phone number, birthdate and schools you or your family has attended. Also, don’t advertise on social media that you are on vacation. You’ll catch attention from the wrong people!
    Cyber Security - tips to stay safe online by UAT Cyber Security experts

    Cyber Security – tips to stay safe online by UAT Cyber Security experts

    • Social engineering – be careful what information you share with people who are randomly and overly curious in specific personal questions.
    • Free WiFi may look legit, but beware it could be disguised with a common name like “Starbucks Guest” so the customer is likely to assume it’s safe and for the use of Starbucks customers. Use a Virtual Private Network (VPN) to be sure communications are safe, even on a public network.
    • Be aware of other tech in your house that may connect to the Internet such as an XBox, Smart TV’s, refrigerators, thermostats and more. These devices can be vulnerable to attacks, as well.
    • Update your software. Hackers commonly target software that does not update automatically because users are less likely to run updates regularly themselves. This can create opportunities for bad guys to infiltrate the program.
    • Passwords are hugely important so don’t be generic. If you struggle in creating a unique password, try multi-factor authentication. In addition to multi-factor authentications, applications such as Lastpass can create lengthy and random passwords for you.

    For more information on cyber security and how you can reach a higher level of training and education, please click to learn more about UAT.

    read more
    UAT Promotes Cyber Security Awareness Month with Tips & Anecdotes

    UAT Promotes Cyber Security Awareness Month with Tips & Anecdotes

    (Oct 06, 2017)

    Alumni Jesse Rogers, who studied Game Design at UAT, had the chance to compete in the final stage of Oculus’s The Unspoken VR Tournament for Oculus Rift Touch last month...

    UAT has led the way in cyber security since the late 90s, writing the rule books for cyber security education in Arizona.

    Marking over 20 successful years since the inception of its elite Network Security degree program, UAT is proud to participate in Cyber Security Awareness Month, during the month of October, allowing our faculty of experts to share important information on cyber security with the public.

    UAT recognizes the importance of training cyber security experts, in its students, alumni, faculty and in local members of the community.

    We have compiled a few tips and anecdotes about our students below.

    From Cyber Security Program Champion Greg Miles:

    • Security isn’t an instant solution. It’s a lifetime process that must be integrated from the very first steps of any project.
    • Introducing the concepts of cyber security and identity protection at an early age, will help you in the battle against the bad guys a.k.a. hackers.
    • UAT provides students with a security education that includes traditional theory, extensive hands-on, innovation projects, and industry exposure. UAT strives to provide employers with well-rounded and well-educated employees to support this rapidly-growing field. We’re priming white hat, ethical hackers for good.
    • UAT students and alumni have the opportunity to work as paid volunteers at Black Hat and attend DEFCON. These epic experiences provide students with extensive exposure to multiple cyber security companies, which is better than any job fair, and awesome experience to add to their resume.
    UAT Cyber Security students at Black Hat

    UAT Cyber Security students at Black Hat

    From Network Security Professor Mason Galatas:

    • Cyber security is really, really important. These figures help illustrate why.
    • The network security attack surface is expected to reach 4 billion by 2020, just over two years from today. Cyber crime is expect to triple during this time. Now is the time to educate yourself.
    • A hack can cripple a company. A security breach, without appropriate remediation measures and response capability, both of which are expensive, can force a company out of business. According to the NCSA, 60 percent of small and medium companies that experience a data breach go out of business within six months.
    Cyber Security Awareness Month at University of Advancing Technology

    Professor Mason Galatas with Cyber Security Alumni Will Peterson

    From UAT President Jason Pistillo:

    • Having started a degree teaching students how to defend networks in 1998, we’ve helped contribute to the Arizona cyber security industry by pre-populating the talent pool for 20 years.
    • That’s allowed a record amount of cyber companies to germinate here in Arizona, Including Trusona (headed by Ori Eisen), Terraverde (Ed Vasko) and CellTrust (Sean Moshir).
    • With the momentum of talent and active cyber companies in Arizona, we have the opportunity to cement Arizona as a central hub for cyber security like the silicon valley of cyber.
    • Anyone can be a script kiddie, it’s takes brilliance, creativity and discipline to be a true cyber security professional and that’s why UAT is so passionate about making sure graduates have proven they have the skills, have competed and won multiple competitions including WRCCDC and created an innovation in their field.
    Cyber Security students at WRCCDC - Take 2nd Place

    Cyber Security students at WRCCDC – Take 2nd Place

    • Our information and privacy is becoming more precarious by the second. The more connected the world gets, the more vulnerable we are; but the worst part is the societal apathy that’s emerging towards breaches of confidential information, privacy and the disregard for Intellectual Property.

    Want to know more about cyber security from UAT’s experts?

    UAT is hosting a Cyber Security Open House on Oct. 12, with industry experts, faculty and alumni to offer tips on how to stay safe online and talk about the importance of Cyber Security education to the public.

    Learn more about protecting yourself online. Dive into what it’s like working for the Cyber Security Industry. Celebrate Cyber Security Awareness month on October 12, with a full slate of activities, industry talks, and topics involving some of industry’s top professionals. Don’t miss out on this incredible educational event!

    What: UAT Cyber Security Open House

    When: Thursday, Oct. 12, from 6:30-8:30 p.m.

    Where: University of Advancing Technology: 2625 W. Baseline Rd. Tempe, AZ 85283

    Why: To celebrate Cyber Security Awareness Month and educate the public on tips to stay safe online.

    RSVP on Eventbrite, space is limited.


    See you on Thursday night!


    read more
    Cactus Con 2017

    Cactus Con 2017

    (Sep 20, 2017)

    The Arizona Science Center is blowing up the night for a special adult-only event featuring a twist on science demos and experiments, a high energy DJ, specialty drinks and a...

    Cactus Con is a local cyber convention that began in 2012 and has been growing each year. Considered to be Arizona’s Defcon, Cactus Con may be the biggest local/regional hacking, cybersecurity conference in Arizona – not to mention, it was started in part by UAT alumni.

    This year Cactus Con will include a robotics village and organizers have asked UAT to run it. UAT Robotics Professor Joseph Horen will be on-hand at Cactus Con to show off robots, drones and answer questions about the program.

    UAT to host Robot Village at Cactus Con

    UAT to host Robot Village at Cactus Con

    UAT will also bring Rasberry Pi and Arduino tech applications. The idea is to have a hands-on, interactive area where the kids and teens can experience building with this technology, including IoT devices and/or Bots that can be coded to do things.

    UAT Network Security alumni and Antimatter Security COO Will Peterson said, “I can’t wait for this years’ Cactus Con! I’m happy to see professionals in local security groups getting involved in conferences and reaching out to the public. It’s great to have local talent collaborating for the better of our industry.”

    What: Cactus Con
    When: Saturday, September 30 from 8 a.m. to 4 p.m.
    Where: Phoenix Convention Center

    Cactus Con participants can attend a variety of workshops, presentations and break-out sessions. Some topics include Cloud computing, Covert communications, Cryptography, Incident response, Malware detection, Framework vulnerabilities, Mobile security, Network reconnaissance and Social engineering.

    We hope to see you at Cactus Con on Sept. 30th!

    read more