Cyber Security Feed

UAT, graduating cyber warriors since 2000

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

Required Fields Are Highlighted
















When do you plan on attending?

University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.

Need assistance with this form?

ABOUT UAT
University of Advancing Technology is an elite, private college that serves its student body by fostering knowledge creation and academic excellence in an environment that embraces the young technophiles of the world. With three centers of research and a suite of technology-centered undergraduate and graduate degrees, the University is a recognized leader in technology education.

Learn More About UAT

    V.A.S.T.

    V.A.S.T.

    (Aug 10, 2017)

    VR begins to evolve at UAT! UAT students from all different majors put their heads together to create a new adaption for the HTC Vive handheld controller. Currently the HTC...

    Data breaches, identity theft, phishing schemes and large scale hacks happen all day, every day. When solving cyber crimes, it’s challenging for a first responder to capture critical information from a computer at a crime scene in the heat of an investigation without the in-depth training that UAT Network Security students received.

    To solve this problem, Network Security alumni Will Peterson struck up a conversation with Professor Frank Griffiths, who teaches forensics at UAT and formerly worked for the Scottsdale District Attorney.

    Will and a four other Network Security put their heads together for their Student Innovation Project and created a device called V.A.S.T., Volatile Data Acquisition System and Technology, an offensive forensics tool.

    For example, if a police officer is at a crime scene serving a search warrant, V.A.S.T. gives them the ability to grab as much volatile data as possible from an open laptop in order to help solve a cyber crime before shutting down the computer.

    VAST-device

    Normally when a computer is powered down, all memory is erased from the temporary position in memory, meaning important evidence could be erased, leaving less evidence to use against a cyber criminal in court. Without V.A.S.T., anything not backed up would be lost if the system was shut down.

    VAST

    Student Innovation Project, VAST, with student Adam Brendan

    The idea is that any person at the civilian level or higher can provide immediate incident response without having any training or deep knowledge of Network Security.

    Professor Frank Griffiths is impressed with the device and can see how V.A.S.T. could be extremely helpful in solving cyber crimes.

    The team is interesting in further marketing and development on this innovative product.

    The team consists of: William Peterson (Network Security/Technology Forensics), Nathanial Stringer (Network Security/Technology Forensics), Adam Brendan, Ian Guile (Advancing Computer Science/ Network Security), Arthur Miramontes (Network Security).

    read more
    less
    UAT Partners with East Valley Institute of Technology (EVIT) To Offer 2-Year Cyber Security Program

    UAT Partners with East Valley Institute of Technology (EVIT) To Offer 2-Year Cyber Security Program

    (Aug 03, 2017)

    A from-scratch re-creation of the iconic opening titles for the classic film The Man With the Golden Arm, created by student Gabe Vigil for DVA254 Motion Graphics class. Considering this...

    UAT Faculty to Teach EVIT’s Cyber Security Courses for College Credit

    UAT recognizes the deficit of skilled workers entering STEM careers and is proud to announce a partnership to kick off this fall with East Valley Institute of Technology (EVIT), a local technology institute for high school students.

    The EVIT partnership will offer a new High School Cyber Security Program under the guidance of UAT Cyber Security Program Champion, Dr. Greg Miles, who will provide the curriculum and support in the training of EVIT Faculty. EVIT students who successfully complete the High School Cyber Security Program will earn 12 college credits toward UAT’s Network Security program.

    UAT is serious about making a difference in Arizona and recently have made an impact in the community by hosting STEM workshops for local Boy and Girl Scout groups, Startup AZ Code Day as well as the Chief Science Officer (CSO) training sessions and now in offering the new EVIT partnership to high school students interested in Cyber Security.

    “There’s a huge gap of students enrolled in STEM classes in the K-12 age group at the national level. The sooner these students are exposed to technology, the more likely they are to continue learning and engaging with tech-related clubs, activities, classes and careers. Events and partnerships like this inspire young students to see themselves working in tech fields well into the future” said UAT President Jason Pistillo.

    President Pistillo is also a recipient of EVIT’s biggest community honor, the Sam and Olga Bender Award, for UAT’s contribution and support of EVIT over the last decade.

    Jason Pistillo with Sam and Olga Bender award

    Jason Pistillo with Sam and Olga Bender award

    UAT Provost Dr. David Bolman said, “With a cyber curriculum that launched in the 1990’s, UAT was the nation’s first accredited higher education institution to offer information and network security degree programs. The thousands of graduates from UAT’s cyber programs provide leadership and shape how information and transactions are secured within every sector of the U.S.”

    UAT is an advocate in STEM, making this collaboration a perfect partnership opportunity in the Phoenix community.

    Encouraging youngsters to explore STEM skills and careers is critical to the development of our workforce.

     

    read more
    less
    Computer Science Student Ups His Personal Security With YubiKey

    Computer Science Student Ups His Personal Security With YubiKey

    (Jul 25, 2017)

    UAT Professors Present Technology Topics to Local Girl Scout Camp UAT is doing its part to encourage more females to explore a future in technology. Last week on June 7,...

    There are “hackers” at any college but especially at UAT, where some of the best Network Security, Technology Forensics, Network Engineering and Information Assurance students in the state receive their education.

    That’s why Advancing Computer Science student Christopher Peterson decided to get secure with his logins. He uses a product called YubiKey, which looks like a small thumb drive that you plug into your computer and it generates a unique, 44-digit, single-use passcode that provides a second line of security for your logins, beyond a username and password.

    “I started using it because I was going to college and their hackers are too good. I didn’t want them to steal my information,” Christopher said.

    yubikey

    Christopher explains a little more about two-factor authentication.

    Hackers have access to “something you know,” which is your password. however, they don’t have access to “something you have” such as YubiKey or a phone app like Google’s two-factor authorization. Christopher decided the YubiKey was a good defense against any hackers who may be sniffing around campus. A third way to authenticate your account login is with “something you are” like your thumb print or a retina scan.

    Google two-factor authentication

    Google two-factor authentication

    What exactly is YubiKey? It’s a multi-protocol USB security key that offers cryptographic protection and touch-to-sign access to your accounts.

    Christopher mentioned that he thinks USB security keys are becoming more popular because lots of news channels have been featuring similar products in news stories to keep citizens aware and protected.

    read more
    less
    Cyber Security Alumni to Hold 2-Day Training at Black Hat Under New Startup Antimatter Security, LLC

    Cyber Security Alumni to Hold 2-Day Training at Black Hat Under New Startup Antimatter Security, LLC

    (Jul 13, 2017)

    Typographic animation of a scene from the TV series Gilmore Girls, created by student Carlie Kratz for DVA254 Motion Graphics class using Adobe After Effects. Related PostsCustom Whiskered Away Xbox...

    Cyber Security alumni have created a startup company for penetration testing called AntiMatter Security, LLC.

    The team consists of William Peterson (Network Security, Technology Forensics), Stephen Chicosky (Network Security, Network Engineering), Kenny Welch (Network Security), Roger Brambila (Network Security, Advancing Computer Science) and Roger Allen (Network Security, Advancing Computer Science) all who earned their degrees from UAT. These students have been to Black Hat Briefings as paid volunteers in the past. This year, they will return to the conference as trainers teaching two 2-day classes they developed called “Attacks Over GSM With Project Mayhem.”

    Attacks over GSM with Project Mayhem at Black Hat

    Participants will immerse themselves in the world of hacking while learning new attack techniques to help defend networks. They will also learn to combine Red Team and Pen-tester prowess to create a less common attack tool, a device that participants will build at the training and can take home with them. With the new Project Mayhem Kit, it’s easier to think like a hacker thinks, engaging in a live environment with an innovative attack tool that you will build and deploy. In this completely hands-on training, you will demonstrate your new abilities to hack air-gapped systems and bypass perimeter defenses over a GSM network.

    A lot of credible information will be disseminated at the training including the following topics: Configuring Mayhem Kit, Basic Scripting Logic, Windows Exploitation, Linux Exploitation, Bypassing Perimeter Defense Systems, Social Engineering Concepts, Covert Concealment and Placement Techniques, Red Team Activity, Data Extraction, Isolating and Exploiting the Target and more.

    The training sessions are already sold out. More information on the class can be found here.

    You can also purchase a cool baseball hat to support Antimatter Security.

    Antimatter Security, LLC swag for sale.

    Antimatter Security, LLC swag for sale. Get yours today!

    Help spread the word. Like Antimatter Security on Facebook!

     

    read more
    less
    See UAT’s Booth at DEF CON 25

    See UAT’s Booth at DEF CON 25

    (Jun 20, 2017)

    Future You University (Future You U) is an event designed to introduce University life experiences to female middle school STEM students.   To be chosen to participate, these girls had to...

    Once the Black Hat Briefings come to an end, some UAT student volunteers will report as workers at DEF CON!

    Because both security conferences fall on the same week, in the same city, many people attend both Black Hat and DEF CON. UAT has a large presence at DEF CON with a huge booth located at Caesar’s Palace where attendees can learn more about cyber security, our bachelor and master’s degrees and check out some cool, nerd swag.

    DEF CON is more edgy than Black Hat, as it was created in 1993 by a core hacker group who wanted to explore and practice technology. This event focuses on the practice of hacking and discovering new ways to infiltrate security.

    One thing is true about DEF CON, these people are extremely passionate about hacking. It’s not just a hobby, but a passion and DEF CON is where these like-minded people can gather for events like CTF Challenges, the Lock Picking Village, the Tesla Car Hack Challenge and more.

    If you are a UAT Net Sec student, be on the lookout for when Black Hat is looking to hire paid volunteers! This experience is a wonderful resume builder and it could even present opportunities that you had never considered.

     

    read more
    less
    Summer of Cyber Security Events

    Summer of Cyber Security Events

    (Jun 07, 2017)

    Following up on our post from March 1st, a team of Digital Video students (and some alumni) have completed work on an action-packed epic short film starring Hollywood actors: “Mitch...

    It’s summer at UAT and not only do we keep campus cool with fun club events and activities at the UAT Founder’s Hall dorms, students enrolled in various Network Security and Cyber Security majors have hot some opportunities to shine.

    Black Hat Briefings

    The Black Hat Briefings is a security conference giving corporate businesses, government agencies, military, the private sector and independent security experts access to panels, industry experts, companies and technology in the security world.

    This year, Black Hat will be held at the Mandalay Bay Resort and Casino in Las Vegas, from July 22- 27.

    UAT Network Security students and alumni have an opportunity to work as paid volunteers with the conference. They are responsible for tasks such as setting up the network, placing network cables, setting up APs (access points or wifi connections), setting up switches and routers, setting up the Network Operations Command (NOC), crowd control, collecting completed documents, classroom presentation support, customer assistance and problem solving when needed. Read about past experiences at Black Hat here.

    DEF CON

    DEF CON is one of the oldest and largest hacker conventions, which seems to continue growing each year. UAT will make its usual rounds at DEF CON to connect with alumni as well as technology-driven individuals interested in network security.

    The UAT booth was a popular spot last year with our selection of witty t-shirts, tech swag and information on attending UAT to obtain a Bachelor’s in Network Security, Network Forensics and Network Engineering or the coveted Master of Information Assurance.

    Keep up with Cyber Security Canyon

    UAT President Jason Pistillo is an advocate and a board member of Cyber Security Canyon. This coalition aims to help grow the cyber security industry in Arizona and make sure that the talent, training, employers and resources exist right here to be a major cyber hub in the nation.

    Security Canyon’s coalition objectives are:

    • Attract and retain the cyber talent in Arizona
    • Share the cyber-related jobs that are available to qualified candidates
    • Provide a focal point for educational partnerships to foster the availability of cyber technology talent across Arizona
    • Promote the benefits of working in the cyber sector in Arizona

    This summer, cyber security students will gain lots of real world experience perfect to add to their resumes!

     

    read more
    less
    2017 Cisco IOT Network Challenge

    2017 Cisco IOT Network Challenge

    (Mar 31, 2017)

    Photo: Dr. David Bolman, UAT Provost; Jason Pistillo, UAT President; and guest speaker Tim Draper / Photo credit: Jake Turocy Tim Draper, a Silicon Valley Venture Capitalist spent time with UAT...

    This weekend at UAT, teams of technology students will compete in a simulation that tests real world networking, security, and consulting skills to deploy an IoT solution for a simulated customer. Each team will act as an IT consulting firm that has been hired by a business to implement a new IoT solution at some of their remote sites.

    Responsibilities will include the design and implementation of a secure network at the remote site to support the connectivity of an “Internet of Things” endpoint (in this case a Raspberry Pi 3 configured as sensor with an embedded web server) that will need to communicate with the customer’s data center infrastructure. Design and implementation will include IPv4 addressing, Layer-2 and Layer-3 networking, WiFi, WAN connectivity, and general security best practices.

    Cisco IOT Network Battle

    Cisco IOT Network Battle held at UAT

    Teams will be provided with the same set of “minimum viable requirement” outlining the exact conditions that must be met for the customer to be satisfied. Once these requirements have been met and validated by a proctor, the teams will be free to creatively differentiate themselves. This could be accomplished by implementing additional features, capabilities, and documentation but is not limited to these categories. The winning team will have met all required functionality and demonstrated how their design, approach, implementation, documentation, and security is superior to their peers and exceeds the customer’s current and future business requirements.

    Technologies used in the event:
    Cisco 800 series router
    Cisco Meraki WiFi
    Cisco Catalyst Switches
    Raspberry Pi with IoT hardware and application
    Cisco Spark (for project collaboration)

    Disciplines/Skills Recommended:
    · CCNA level networking skills
    · IPv4 addressing
    · NAT, PAT, and DHCP
    · 802.11 wireless basics
    · Cisco switching concepts and cli configuration
    · Cisco routing concepts and cli configuration
    · Cisco router Access Control Lists
    · Basic Linux shell commands (for troubleshooting the Raspberry Pi 3)

    The 2017 Cisco IOT Network Challenge is being held at UAT on April 1, from 7 a.m. – 5 p.m. We look forward to an exciting competition between UAT, MCC and GCU.

    read more
    less
    UAT’s Network Security Team Takes A Roadtrip To WRCCDC

    UAT’s Network Security Team Takes A Roadtrip To WRCCDC

    (Mar 23, 2017)

    Calling all game studies students! The 2017 Spring UAT Game Studios development teams are looking to add new members! Are you an artist, game programmer, game designer, or marketeer? Power...

    UAT Cyber Security students have been prepping for the Western Regional Collegiate Cyber Defense Competition (WRCCDC) since last fall. They competed in the CCDC Virtual Qualifier in January 2017, finishing in 4th place, which secured them a spot at WRCCDC on March 24-26, 2017, at the Cal Poly Pomona Bronco Center.

    UAT students take this competition very seriously as there is a selection process for being accepted to UAT’s CCDC team. Keep in mind that UAT took 2nd place at 2016 WRCCDC. This being the 10th year of the NRCCDC, UAT would like to mirror that level of success in 2017, if possible.

    Cyber Security Professor Wayne Kibbe will serve as faculty coach and team chaperone for the roadtrip on their journey to Cal Poly Pomona for the competition.

    Network Security students with Professor Wayne Kibbe in UAT's Cyber Warfare Range

    Network Security students with Professor Wayne Kibbe in UAT’s Cyber Warfare Range

    Professor Kibbe said, “We have an amazing amount of talent on the team this year to help us do well. These students not only take our security courses but in addition hold workshops ever weekend to practice and hone their skills. I’m very proud of their efforts and hard work that got them to this point.”

    During the competition, it’s important to stay organized and effectively communicate with team members.

    “Each member of UAT’s team has a primary responsibility or specialty, whether its extensive knowledge of Linux, Windows or another operating system, there is an expert that the team can rely on,” said Savlowitz.

    What is CCDC?
    The Collegiate Cyber Defense Competition was created in 2004 by a group of educators, students, government and industry representatives who had interest in developing an event to engage post-secondary level students in regular cyber security exercises.

    CCDC is a 3-day event and the first ever competition that specifically focuses on the operational aspect of managing and protecting an existing “commercial” network infrastructure. Not only do students get a chance to test their knowledge in an operational environment, they have the opportunity to experience real time incident response.

    Only 8 teams from the WRCCDC Qualifier make it to the face-to-face regional.From the Regional competitors only the winning team gets an all expense paid trip to National CCDC.

    The CCDC competition asks student teams to assume administrative and protective duties for an existing commercial network – typically a medium business with 50+ users, 8 to 16 servers, and common network services such as a web, E-mail and e-commerce. Each team begins the competition with an identical set of hardware and software for their fictitious business and teams are scored on their ability to detect and respond to outside threats, maintain availability of existing services and respond to business requests such as the addition or removal of services or hardware, balancing security needs against business needs.

    Good luck competing, UAT!

     

    read more
    less
    UAT Network Security Team Qualifies for Western Regional CCDC

    UAT Network Security Team Qualifies for Western Regional CCDC

    (Jan 31, 2017)

    Did you know that UAT offers a class on the hit zombie apocalypse drama The Walking Dead? Why yes, we do! You can also learn how to bring Virtual Reality products to market right...

    UAT Cyber Security students finished in 4th place at the CCDC Virtual Qualifier over the weekend securing them a spot at Western Regional Collegiate Cyber Defense Competition (WRCCDC) on March 24-26, 2017, at the Cal Poly Pomona Bronco Center. UAT students are far from newbs to this competition, as UAT took 2nd place at 2016 WRCCDC.

    In the zone…

    UAT’s roster of 11 students including the eight selected participants and three alternates locked themselves in the Cyber Warfare Range an hour prior to competing, in order to brainstorm strategies, review items of interest, and discuss tactics if certain issues arise. It’s wise to be prepared and have a cohesive game plan for the entire team, especially when working under a time crunch!

    Cyber Security Professor Wayne Kibbe acted as faculty coach for UAT’s team and Professor Abby Pfeiffer served as a remote site judge during the virtual qualifier to uphold general rules of the competition.

    Professor Kibbe said, “Watching our hard-working students get rewarded for their efforts was very exciting and made me very proud. The tension at the end waiting for the scores to be finalized was incredible. It was like watching your favorite politician win on election night. When the scores were announced, the Cyber Warfare Range was filled with high-fives, shouting, and celebration. Now, on to Regionals!”

    “It was an experience, that’s for sure. It was a bit more nerve-wracking than expected, I had a lot of fun, but it reminded me of how much I still don’t know about the industry and how much I still need to work on.” – Robert Thompson, Junior

    Senior David Savlowitz mentioned there is a selection process for being accepted to the CCDC team at UAT, which is taken very seriously. Veteran members of the CCDC team take a vote on which Network Security students have highly expressed dedication to the topic in order to form the new team. With his experience at CCDC, David has sized up the competition and suspected that the UAT had what it would take to qualify this year.

    Network Security students participate in the CCDC Qualifier

    Network Security students participate in the CCDC Qualifier

    Savlowitz said, “Some of the other teams are really good at designing the networks and troubleshooting them, but aren’t as experienced in actively defending them. At UAT we proactively work weekly on these topics. Another drill that the freshman hate, but then start to love are the “red vs. blue challenges,” where freshman battle the seniors. “It’s fun right?” “Yeah, when I’m not bashing my head against the desk, but it’s helpful for learning how to defend against someone trying to get in,” said Freshman Adam Morris, a CCDC team alternate.

    During the competition, it’s important to stay organized and effectively communicate with team members.

    “Each member of UAT’s team has a primary responsibility or specialty, whether its extensive knowledge of Linux, Windows or another operating system, there is an expert that the team can rely on,” said Savlowitz.

    What is CCDC?

    The Collegiate Cyber Defense Competition was created in 2004 by a group of educators, students, government and industry representatives who had interest in developing an event to engage post-secondary level students in regular cyber security exercises.

    CCDC is a 3-day event and the first ever competition that specifically focuses on the operational aspect of managing and protecting an existing “commercial” network infrastructure. Not only do students get a chance to test their knowledge in an operational environment, they have the opportunity to experience real time incident response.

    Preparing for the CCDC Virtual Qualifier in the UAT Cyber Warfare Range

    Preparing for the CCDC Virtual Qualifier in the UAT Cyber Warfare Range

    Only 8 teams from the WRCCDC Qualifier make it to the face-to-face regional. From the Regional competitors only the winning team gets an all expense paid trip to National CCDC.

    The CCDC competition asks student teams to assume administrative and protective duties for an existing commercial network – typically a medium business with 50+ users, 8 to 16 servers, and common network services such as a web, E-mail and e-commerce. Each team begins the competition with an identical set of hardware and software for their fictitious business and teams are scored on their ability to detect and respond to outside threats, maintain availability of existing services and respond to business requests such as the addition or removal of services or hardware, balancing security needs against business needs.

    Here’s the scenario:

    You have just been hired as the network and security administrators at a small company and will be taking administrative control of all information systems. You know very little about the network, what security level has been maintained, or what software has been installed. You have one hour to familiarize yourself with the network and systems and to begin the security updates and patches before the red team starts actively attacking your company, you must also have to keep up with the needs of the business and user demands while maintaining service level agreements for all critical Internet services.

    The Winners are…

    Here are the top 8 qualifying teams who will move on the WRCCDC Competition on March 24-26, 2017, at the Cal Poly Pomona Bronco Center.

    1. California State University, Northridge
    2. Stanford University
    3. University of California, Riverside
    4. University of Advancing Technology
    5. Cal Poly Pomona
    6. Arizona State Sun Devils
    7. UC Berkeley
    8. CSUSB

    Congratulations everyone! We look forward to competing in March.

     

    read more
    less
    Cyber Monday Shopping Safety Tips from UAT Cyber Security Professor

    Cyber Monday Shopping Safety Tips from UAT Cyber Security Professor

    (Nov 23, 2016)

    Get to know others in the WordPress community! Attend WordCamp Phoenix on October 1- 2 at the Phoenix Convention Center. WordCamp Phoenix is led by local volunteers who work hard to deliver...

    The holidays are almost here which means the online shopping season is upon us. With the initiative of free shipping being offered by many retailers, online shopping sure is convenient, but is it safe?

    UAT Cyber Security Professor Dr. Greg Miles shares his tips for safe online shopping this Cyber Monday.

    1. Shop at reputable sites – check to make sure you are on a secure site and haven’t been redirected somewhere else before entering your personal information
    2. Use a credit card with a low credit limit
    3. Don’t use a debit card, it’s more difficult to dispute charges and the banks may take longer to issue a refund
    4. Use payment apps like Paypal
    5. Verify your order before you hit submit, take a screenshot for your records
    6. Keep track of your purchases, this is the time of year fraudulent charges can be hidden due to the potential increase
    7. Check your card statement to assure that you recognize each charge as one you made

    Do your best to safeguard yourself from identity theft and fraudulent charges with these helpful tips this holiday season, but remember it’s a fun time of year. Enjoy the festivities!

     

    read more
    less