header partial here
1
2
3

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

 
 
Next
Previous
 
Next
University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By clicking submit, you verify you are at least thirteen years of age, give us permission to store and process your personal information submitted above, and contact you through email, post, SMS, phone, autodialed and/or pre-recorded telemarketing. Carrier fees may apply to SMS messages, which can be opted out of at any time by replying STOP. Read our privacy policy here. Please note that such consent is not required to attend UAT and you may update your communication preferences at any time.
Previous
 
Submit

ABOUT UAT
University of Advancing Technology is an elite, private college that serves its student body by fostering knowledge creation and academic excellence in an environment that embraces the young technophiles of the world. With three centers of research and a suite of technology-centered undergraduate and graduate degrees, the University is a recognized leader in technology education.

Learn More About UAT

    The Integration of Drones into Cyber Security Strategies


    You may be surprised, but drones are playing a pivotal role in enhancing network security in several innovative ways. As technology evolves, the integration of drones into cybersecurity strategies has opened new...

    You may be surprised, but drones are playing a pivotal role in enhancing network security in several innovative ways. As technology evolves, the integration of drones into cybersecurity strategies has opened new avenues for protecting digital infrastructure.

    1. Advanced Surveillance and Monitoring: Drones are equipped with high-resolution cameras and other sensors that allow for detailed surveillance of large and remote areas. This capability is particularly useful for monitoring the physical security of network infrastructure like data centers, communication towers, and cable routes. By providing real-time visuals and data, drones help in early detection of physical breaches or tampering that could lead to network vulnerabilities.

    2. Aerial Assessment of Wireless Networks: Drones can be used to assess the security of wireless networks. Equipped with the right tools, they can identify unsecured Wi-Fi networks, detect unauthorized access points, and analyze signal strengths and vulnerabilities. This bird’s-eye view approach enables a comprehensive assessment of network security, which is often challenging to achieve from the ground.

    3. Inspection of Hard-to-Reach Infrastructure: Many components of network infrastructure, such as antennas and satellite dishes, are located in difficult-to-reach areas. Drones can easily access these spots to inspect for physical damages or unauthorized devices that could compromise network security.

    4. Rapid Deployment in Incident Response: In the event of a suspected network security breach, drones can be quickly deployed to the affected site. They provide immediate visual feeds and data analysis, allowing for a quicker response and assessment of the situation.

    5. Testing Network Resilience: Drones can simulate potential security threats to a network, helping organizations test their defenses and response protocols. By mimicking attacks like denial-of-service (DoS) from various locations and altitudes, drones help in strengthening network security measures.

    6. Data Encryption and Secure Transmission: When it comes to handling sensitive data, drones equipped with secure communication links and strong encryption protocols ensure that the data they collect and transmit is protected against interception and cyber threats.

    Drones offer a unique and versatile approach to network security, extending the reach of traditional cybersecurity measures. Their ability to provide aerial insights, rapid response, and innovative testing capabilities make them an invaluable asset in the ongoing battle against network security threats.

    read more
    less

    Defending Against Blacklotus: UAT's Cyber Security Program Sheds Light on UEFI Attacks


    The Blacklotus malware is a UEFI bootkit that targets systems at one of their earliest points of availability. During the boot process. ESET malware researcher Martin Smolár noted that this begins with executing an installer that deploys the bootkit files to the EFI system partition, disables the HVCI and BitLocker protections, and reboots the host....
    The Blacklotus malware is a UEFI bootkit that targets systems at one of their earliest points of availability. During the boot process. ESET malware researcher Martin Smolár noted that this begins with executing an installer that deploys the bootkit files to the EFI system partition, disables the HVCI and BitLocker protections, and reboots the host. Legitimate binaries vulnerable to CVE-2022-21894 (Windows Hypervisor Loader, Windows Boot Manager, PE binaries) and their custom Boot Configuration Data (BCD) are then exploited and persistence on machines with UEFI Secure Boot enabled is achieved after the initial reboot by exploiting CVE-2022-21894 and installing the attacker’s Machine Owner Key (MOK). A self-signed UEFI bootkit is launched after reboot and the malicious kernel driver and an HTTP downloader are deployed. This will allow the attacker to complete the installation of the attack.
     
    This is particularly devastating because most users are unfamiliar with the boot process, UEFI, and most of the underlying software and firmware that the system uses to support operations. This means that attackers are going to target the computer in places where the average user is neither going to know how to fix nor even identify the vulnerability. Most users are unaware of how much computing power exists below Ring 0 and lives tucked away from the user space, and this is exploited by more technically savvy attackers.
     
    However, individuals enrolled in our cyber security program at UAT are exposed to UEFI, boot loaders, and even systems like Minix which are used at the heart of many computers today. By being exposed to these tools early on in their development as cyber security students, they are able to identify or defend against some of these attacks. The most important aspect being the identification of and ability to respond to these types of issues.
     
    __________________________________________________
     
     
    Professor Jones is the lead Cyber Instructor at the University of Advancing Technology and is a software developer who currently creates applications for law enforcement. He is also an AZ Peace Officer Standards and Training certified General Instructor as well as a public speaker. He earned a BS, in Computer Information Systems from Park University in 2013 and an MA, in Intelligence Analysis with a focus in Cyber Security in 2014. Professor Jones has been the recipient of recognition from the El Paso Police Department, State Of Texas, Texas Military Forces, Chandler Police Department, and others.

    Professor Jones is also active in the community as the founder of the Phoenix Linux Users Group Cyber Security Meetup and regularly teaches members of the public a myriad of topics related to Cyber Security. His audience includes students, teachers, law enforcement, military, government officials, and concerned members of the public with a strong desire to learn what is going on in the world of technology.
     
     
    read more
    less

    What is Kali Linux?


    Kali Linux, formerly Backtrack Linux, is a Debian-based and open-source operating system distribution with the intention of making penetration test and auditing tools available to the average user. Kali Linux can be installed or otherwise booted up with hundreds of tools preinstalled to make tasks such as forensics and reverse engineering much more accessible to...

    Kali Linux, formerly Backtrack Linux, is a Debian-based and open-source operating system distribution with the intention of making penetration test and auditing tools available to the average user. Kali Linux can be installed or otherwise booted up with hundreds of tools preinstalled to make tasks such as forensics and reverse engineering much more accessible to less technical users.

    Kali is completely free, has an open-source Git tree available, is Filesystem Hierarchy Standard compliant, and supports a wide range of hardware. You can install Kali locally onto hardware or run it from a USB drive as a live distribution and it will typically be highly compatible with numerous additional devices.

     kali linux

    Kali can be used to conduct penetration testing, security auditing, digital forensics, or reverse engineering. The applications installed come from a minimal set of repositories and the goal is to keep upstream software sources to a minimum. The intention being that users can deploy Kali quickly and easily into an environment and get to work with minimal fuss or the need for additional training.

    Remember that Kali was not designed to be a daily driver and installing any unapproved applications is not support. While Kali can potentially make your life easier, it is certainly not designed to be an everyday OS. You will not be able to install games or other out of band software without many issues or problems. Kali fills a very specific niche but if you have need of a system to accomplish your goals, it may do those things very well.


    Earn a Degree in Cyber Security at UAT

    UAT offers a Master’s of Science in Cyber Security, as well as bachelor’s degrees in Network EngineeringNetwork Security, and Technology Forensics. Our Cyber Security Degree for Ethical Hackers and Network Security Curriculum has been certified through the NSA/DHS National Information Assurance Training Program in Information Assurance and Cyber Defense.

    Designated as a Center of Academic Excellence by the National Centers of Information Assurance Education (CAE/IAE), UAT’s Network Security Bachelor’s of Science degree prepares students to take on the ever-evolving world of information security.

    If you believe a career in cyber security may be right for you, request information about our degree programs. At the University of Advancing Technology, we’re passionate about helping students enter STEM fields and acquire the skills they need to land a rewarding career in cyber security and beyond.

    read more
    less

    Running Your Own Email Server


    What is MIAB? Running your own email service provider sounds like a daunting task but it can be made easier by using an array of tools that have been combined into a self-hosted service called "Mail in a box" (MIAB). MIAB turns a fresh cloud computer into a functional mail server,...

    What is MIAB?

    Running your own email service provider sounds like a daunting task but it can be made easier by using an array of tools that have been combined into a self-hosted service called "Mail in a box" (MIAB). MIAB turns a fresh cloud computer into a functional mail server, and you do not need to be a technology expert when setting it up.

    MIAB will assist you in setting up both webmail as well as an IMAP/SMTP server for use with mobile devices and mail software that runs on the desktop. You can also manage your contacts and synchronize your calendar. You get the standard functionality like spam protection, mail filtering, email client auto-configuration, and you can even back it all up to Amazon S3. If you allow MIAB to function as your DNS server you will get access to automatic SPF, DKIM, DMARC, and MTA-STS security.

    email server 2

    MIAB runs awesome on Amazon EC2 instances and by combining the knowledge of the cloud with some basic capabilities to run bash scripts, you can get online very quickly. You will need a domain name and a server, and those costs can be kept very inexpensive by using an affordable provider such as AWS.

    Whether you are concerned about mass electronic surveillance or want to contribute to the decentralization of the web, it is possible that a tool like mail in a box could provide you with the simplified tools you need to accomplish your goals. For more information about this topic, check out these resources: https://mailinabox.email/ and https://sealedabstract.com/code/nsa-proof-your-e-mail-in-2-hours/ .

    SECURE YOUR FUTURE WITH A CYBER SECURITY DEGREE

    UAT offers a variety of degree choices, from associate to master degree options. Don't wait. Apply now!

    Explore UAT's cyber security degrees: 

    read more
    less

    What is a Password Manager?


    Forgot Password? A password manager is a tool that is designed to manage many passwords in a secure and easy to access manner. Using a single password for all your accounts increases the likelihood that you will be breached over many accounts by a large percentage. It is important...

    Forgot Password?

    A password manager is a tool that is designed to manage many passwords in a secure and easy to access manner. Using a single password for all your accounts increases the likelihood that you will be breached over many accounts by a large percentage. It is important that you use a strong password that is not easily guessed on each account, and this is best facilitated not by trying to remember your passwords but instead by deploying the technology necessary to make this a trivial exercise.

    Google Online Security Survey found that 52 percent of all the individuals who responded to them reused the same password for more than one account. That means, if you provide this password to a company that is breached, you can now expect that password to be included in brute force lists and eventually to be used to break into your accounts. Reducing the likelihood that a compromised, weak, or reused password will be used against you starts with the use of a password manager.

    Password Body

    You have many choices when it comes to password managers. You can deploy something self-hosted or use a password manager provided by a company. While we do not recommend any password manager, we will mention that SAASPASS, an application available over several devices provides the ability to store passwords as well as manage One Time Password tokens, tremendously reducing complexity. Finding something that meets your needs, is easy to use, and secure can be difficult but the features provided by any password manager are typically parallel and only the service and support of the company as well as price will typically differ.

    By using a password manager, you will no longer need to memorize all your passwords. You can automatically generate a secure password using built in tools. You can also leave your master password in your personal documentation in the event of your death to facilitate your digital inheritance. All these benefits make your life easier, more secure, and safer.

    Even if you do use a password manager, do not forget to use a complex and original password per account, enable two factor authentication, and think about how you will recover accounts in the event you lose a device. Your security begins with practicing best practices related to cyber security.

     


    SECURE YOUR FUTURE WITH A CYBER SECURITY DEGREE

    UAT offers a variety of degree choices, from associate to master degree options. Review the programs available here. Don't wait. Apply now!

    SOC

    read more
    less

    UAT Retires Cyber Warfare Range, Introduces SOC


    UAT Adds Security Operation Center After more than 10 years, University of Advancing Technology (UAT) retired its Cyber Warfare Range and in August 2021, added its own Security Operations Center (SOC), where students can work alongside mentors...

    UAT Adds Security Operation Center

    After more than 10 years, University of Advancing Technology (UAT) retired its Cyber Warfare Range and in August 2021, added its own Security Operations Center (SOC), where students can work alongside mentors to learn how to manage SOCs for virtually any organization. Security Operations Centers are important for any organization looking to decrease cyber threats and attacks. It is a central hub in charge of predicting, assessing, and taking action against cyber threats, as well as working to prevent them altogether. This center is available to all students, but it is most pertinent to Network Security, Cyber Security, Network Engineering and Technology Forensics majors.

    What is a SOC and Why Do We Need One?

    Security Operations Centers are 24-hour security hubs that work to increase the level of cyber security within an organization. Security engineers and analysts work in SOCs around the clock to analyze, prevent, and ultimately stop cyber attacks. Cybercriminals will attack at any time of day, which makes these centers so important to an organization's cyber security.

    SOCs are essential to every organization, UAT being no exception. The benefit of having a SOC at the university is that students can get hands-on experience and training in a place not unlike one they could work in after graduation. Students with an interest in Cyber and Network Security get the opportunity to assess and address cyber threats in real-time. Working at UATs SOC can make your resume stand out amongst other college graduates who weren’t afforded the same opportunities. At UAT, we believe everyone should get the experience they need before they even graduate.

    The main feature of the SOC is the ability to connect to UAT's virtual machine cluster. This gives student the ability to interact with any operating system as long as they have the have the ISO file for it. Another benefit of the virtual machine is the ability to restore the state of the virtual computer once you take a snapshot. For example, students can run malware on a virtual machine and observe it. Then when they're done, they can examine the damage and can revert it. They are able to go back to the stage before the malware had been run. Cyber Security Associate Professor Jeremy Bunce adds, "Templates of virtual machines can be made, allowing me as an instructor, to create 15 Windows computers for my students to use in a class. Or have a virtual machine with misconfigurations that the students could get hands on practice fixing."

    UAT_Network_Security_SOC

    What Happens in a SOC?

    The functions and occupations of a security operations center can be boiled down to five major tasks: monitoring, response, remediation, consistency, and context. 

    1. Monitoring is tracking of cyber threats or potential threats. 
    2. Response is reacting to, and fixing said cyber threats and attacks. 
    3. Remediation is assessing current security operations and finding weak points. 
    4. Consistency is maintaining a security operation and abiding by it in an ethical way.
    5. Context is determining specific functions and needs of an organization that a SOC team can fulfill.

    Professor Bunce explains, "The SOC is used by student to do their homework so they can practice hacking without risking their own computer." He adds, "The SOC is typically not used by non cyber students since it normally requires them to take a network security class to gain a login. Faculty can use the SOC to set up virtual machine to either demonstrate an exploit or set up a lab for them to work on."

    "We have hosted Cyber Patriots here in the SOC," Bunce shares about community involvement in the SOC. "It’s a network security competition for high school students where they compete against other schools. They use our room for both doing the competition and hosting their training in the SOC." 

    There are also events held in the SOC, such as Capture the Flag and Red v. Blue. If you are new to cyber security, these are competitions held for students that give them hands-on experience in real world settings. Bunce explains what Capture the Flag is, "You are given a task and need to complete it which results in you getting a file that is called a flag. Some examples of task are decrypting a text to get the original text or using a computer exploit to gain access to it and downloading a file called flag.txt." Students take part in these to not only learn the skills, but to be able to preform under pressure.

    There are many benefits to having a SOC, but one of the most important benefits is the students having access to a setup like this. As mentioned before, the SOC replicates SOCs they will encounter in the real world, assuring they are prepared once they graduate. Students can make virtual machines that meet an industry standard SOC. This allows the students hands-on practice and the ability to revert changes if they make a mistake. "Another aspect of our virtual machine cluster is that each class has a private network. This allows an installing windows server class and an ethical hacking class at the same time without them interfering with each other. This also allows for Capture the Flag competitions to be run on the virtual machine cluster. There is also the added benefit of having a room dedicated to network security for students to set up collaboration or work on projects together," shares Bunce. Along with the hands-on learning experience, students have access to a PowerEdge T340. If you aren't familiar with what it is, it is a mini server with two monitors.

    UAT_Jeremy_Bunce_CTF

    How Can I Get Involved?

    Contact an advisor or a professor for more information on getting involved with the SOC. Working at the SOC can be a great way to build your resume and gain workplace experience. UAT is excited about this recent addition to the campus and encourages students to look into it.  Become a part of the solution today and get hands-on experience dealing with real cyber threats and attacks and maintaining security procedures.

    read more
    less

    Tim Roemer Presents The Five Cs of Cybersecurity to UAT Students & Community


    Technology is the life force of University of Advancing Technology (UAT). Fostering technology discussions and exploring the edge of innovation are what UAT does best. In spirit of advancing technology, UAT constantly invites guest speakers to...

    Technology is the life force of University of Advancing Technology (UAT). Fostering technology discussions and exploring the edge of innovation are what UAT does best. In spirit of advancing technology, UAT constantly invites guest speakers to visit campus to impart wisdom, facilitate discussion and provide networking opportunities and community connections with students.

    Tim Roemer, a 2022 UAT Honorary Doctorate recipient, visited campus to speak with students about the State of Arizona's Five Cs of Cybersecurity. The five Cs include culture, communication, collaboration, conviction and consistency. Before presenting to all of UAT and the community, he held a private luncheon for cyber security students, allowing them to dive deep into their cybersecurity questions.

    “I can tell you from real world experience that, unfortunately, there are still myths out there at senior levels of government and law enforcement about cybersecurity. People still throw the term cybersecurity out when they just mean general technology. But we’re going to take it because it gives us momentum.”

    Tim Roemer was appointed by former Governor Ducey in April of 2021 as the Director of the Arizona Department of Homeland Security. Director Roemer advised the Governor on a wide range of topics including cybersecurity, border security and counterterrorism.

    Director Roemer also manages cybersecurity for the State of Arizona as the State’s Chief Information Security Officer (CISO). As State CISO, Director Roemer leads the State’s cybersecurity team, sets cybersecurity strategy and defends the State against evolving cyber attacks that threaten citizens' data and Arizona’s critical infrastructure. Through consistent vigilance of culture, communication, collaboration, conviction and consistency, Director Roemer will help Arizona improve cybersecurity resiliency.

    “My team has regularly scheduled calls with technology leaders in the State to update them on what to be on the lookout for and what we are blocking at a state level. For the longest time, one of the biggest things criminals were utilizing in phishing emails were COVID heat maps, so it was like 'click here for a heat map of COVID cases in your community' and that's how they were getting a lot of government employees to click on the phishing emails.”

    Director Roemer’s career is quite impressive. He has served the State of Arizona in a variety of leadership roles prior to his current appointment. This includes four years in a dual role as the Governor’s Public Safety Advisor and Deputy Director of the Arizona Department of Homeland Security, one year as the Governor’s Deputy Director of Legislative Affairs and two years as the State’s CISO. Director Roemer has served on numerous Boards and Commissions including the Arizona-Mexico Commission’s Security Committee and the Human Trafficking Council since the beginning of former Governor Ducey’s Administration in 2015.

    "Recently, the human trafficking counsel has been asking my team for some help because my team is naturally very good online They're better than most criminal investigators, they can find things out a lot faster. They can write rules for things and consolidate information a lot faster."

    Director Roemer served in the Central Intelligence Agency for 10 years before working for the State of Arizona. The final two years of his CIA career were spent assigned to the White House Situation Room, where he provided critical national security updates to the President, Vice President and National Security Council. In this role, he was responsible for briefing senior U.S. policymakers on a broad range of national security-related issues.

    Director Roemer supported the CIA mission at its headquarters in McLean, Virginia in addition to his time in the West Wing. Over his decade-long career in the U.S. Intelligence Community, he also completed assignments at the National Geospatial Intelligence Agency and the National Reconnaissance Office.

    It was a great event that helped showcase to students the vast ways their careers in cybersecurity could go. At UAT, it's important to for us to introduce students to the real world possibilities of their future. This event granted them the ability to pick the brain of a very successful cybersecurity professional.

    read more
    less

    Cybersecurity: the 6th C of Arizona


    Students Gain Industry Insight from Director Roemer On Monday, October 3, 2022, students, staff and faculty welcomed Director of the Arizona Department of Homeland Security, Tim Roemer, to ...

    Students Gain Industry Insight from Director Roemer

    On Monday, October 3, 2022, students, staff and faculty welcomed Director of the Arizona Department of Homeland Security, Tim Roemer, to University of Advancing Technology (UAT). Director Roemer was as energetic as he was insightful during his campus visit. Starting off the day, cyber students were invited to an intimate lunch where they could ask Director Roemer questions, gain insight from his experience and hear some funny stories that reminded everyone it's okay to not know everything about every thing.

    Network Security and Network Engineering student, Tyler Prettyman, shares his experience from the day. "Getting to meet Director Tim Roemer is something I am very thankful for. I feel very lucky as a student to get insight about the industry from such a high ranking government official. Not only was Director Roemer very knowledgeable, he was very friendly and fun to talk with."

    Prettyman continues, "One of the takeaways from my conversations with the director was that connections are everything. Networking with good people can lead to great opportunities. Another topic that he talked about was how to bring cybersecurity to the general audience—it was very interesting on how he did it with his own team. I feel as some of his insights and recommendations will stick with me for awhile."

    TimRoemerLunch

    After the lunch, Director Roemer presented to all students, faculty, staff and the community about the 5 C's of Cybersecurity, different from the 5 C's of Arizona, which he tested everyone on (we passed!). Roemer added, "I always say cybersecurity is the sixth C of Arizona." Before getting into the five C's, he shared what it was like when he was starting out. He was first exposed to how important cybersecurity was back in 2012 when nation-states were attacking the US financial sector—they were targeting banks, attempting to shut them down. "Cybersecurity was growing in its demand of policy makers to pay attention to it, but not a lot of people had a lot of experience in it," explained Director Roemer.

    Director Roemer was great at being transparent and sharing with the students the reality of getting started in, not just cybersecurity, but any field. "From day one it was like drinking out of a fire hose. Figuring out working with experts, how for me to be a generalist, and to bring it to a level that I really understood the nuances of cybersecurity," he continued, "and how the state was going to move ourselves forward." As he explained the progression of his role, his experience also touched on the first C of Cybersecurity. Director Roemer discussed culture, "The first thing I knew we had to do was create a culture of cybersecurity awareness. We mandated annual cybersecurity trainings for all 36,000 state of Arizona employees immediately."

    5 Cs of Cyber

    He described the different groups who are the biggest threats to cybersecurity: nation-states, criminals and hacktivists. People asked him what keeps him up most at night, and he replied, "Probably the criminals. When people are actually stealing your data, now you've got a huge problem, and the criminal networks have proved that's where they want to go. Cybersecurity knows no borders." Moving right into the fourth C of Cybersecurity, Director Roemer discussed convictions. "Actually making cybersecurity incidents into a prosecutorial issue. These events are crimes and someone needs to be held responsible." He continues, "This is not a victimless crime. You cannot get away with this anymore. We have to prosecute the cyber criminals that are out there. We need to build cases with law enforcement, and make examples out of them."

    The fifth C is consistency, which Director Roemer mentions is short and sweet but necessary. "You can do all those things [the four other C's of cybersecurity], but you can't do them once. You have to do them all day, every day, 24/7, 365." After wrapping up the 5 C's, there was a question and answer portion where Director Roemer went into more detail about his time working with the White House, his thoughts on current events and what the best advice for students is. He stressed the importance of networking in the cybersecurity field for current and future students. Ending the educational day, with a campus tour, starting with UAT's Security Operations Center (SOC), where Director Roemer said he's "been incredibly impressed."

    Sam Roethemeyer, a Network Security student, reflects on the day. "It was really insightful to hear from not only a professional in the industry but from the director of the Arizona State Department of Homeland Security. As someone who currently has an internship with the Arizona Department of Economic Security, specifically with the Security, Risk, and Compliance team, it was reassuring to hear from him about some of the difficulties they have had because they match up with some of the difficulties my team has had. I also went to the lunch with him, so we were able to get a little more personal. We picked his mind for a bit, and he gave us some tips on career business in cybersecurity. When you think about someone in his position, you would think they would be a lot more intimidating, but he was down to earth, friendly and very approachable. He told us his path through his career, and it is amazing at how time and opportunities lined up so well for him to end up in the position he is in now."

    TimRoemerSOC

    Earn a Degree In Cyber Security at UAT

    UAT offers a Master’s of Science in Cyber Security, as well as bachelor’s degrees in Network EngineeringNetwork Security, and Technology Forensics. Our Cyber Security Degree for Ethical Hackers and Network Security Curriculum has been certified through the NSA/DHS National Information Assurance Training Program in Information Assurance and Cyber Defense.

    Designated as a Center of Academic Excellence by the National Centers of Information Assurance Education (CAE/IAE), UAT’s Network Security Bachelor’s of Science degree prepares students to take on the ever-evolving world of information security.

    If you believe a career in cyber security may be right for you, request information about our degree programs. At the University of Advancing Technology, we’re passionate about helping students enter STEM fields and acquire the skills they need to land a rewarding career in cyber security and beyond.

    read more
    less

    6 Things to Know Before Choosing Network Security as Your Major


    What to Consider Before Earning a Network Security Degree Threats to network security only grow as technology advances. While network security professionals are staying up to date on the latest cyber threats, cybercriminals are working on new ways to...

    What to Consider Before Earning a Network Security Degree

    Threats to network security only grow as technology advances. While network security professionals are staying up to date on the latest cyber threats, cybercriminals are working on new ways to stump professionals. This means that the need for network security professionals is expanding daily. Not only are network security professionals needed to create the most secure network possible, but they must also be prepared to counterattack any unauthorized users. 

    A degree in Network Security could help you protect other people’s information in a world where it’s normal to entrust data to online networks. University of Advancing Technology (UAT) explains, “Network security utilizes proactive techniques, including defense-in-depth and layered security, to mitigate or eliminate vulnerabilities in information systems and to protect against potential exploitation." 

    This means that network security is important for corporations that store company and personal data online. It’s more efficient to store information digitally, but digital data can be breached, which is why network security is so important. It puts up cyber walls to impede cyber criminals from accessing people’s information. 

    network_security_degree_UAT2

    UAT's Security Operations Center (SOC) where various Cyber Security courses are held and students can utilize it as a workspace. 

    Here are six questions you may be wondering as you decide whether or not a Network Security degree is right for you.  

     

    1. What is a Network Security Degree? 

    A degree in Network Security is a specific Bachelor of Science degree within the Cyber Security curriculum that prepares you for a career in the network and information security field. At UAT, this degree offers the student real world experience and invaluable problem-solving skills training. 

    To appropriately prepare students for the ever-growing world of cyber security, this degree is one of UAT's more rigorous and sought after degree options. Fortunately, careers in network security can also be lucrative for those with a degree. 

    2. Is a Network Security Degree Worth It?  

    An undergraduate degree in Network Security from UAT offers graduates the opportunity for a career in a potentially lucrative field that is exponentially growing in demand for cyber security talent. There are several career opportunities to choose from, making this degree versatile and consistently necessary. Currently on LinkedIn in 2022, there are over 170,000 jobs listed for network security in the United States. So, a degree in Network Security is worth it in the sense of opportunity and potential growth outlook. 

    At UAT, courses are offered year-round. Therefore, full-time students can graduate in 2.8 years. You can also earn your master’s degree in Cyber Security in less time. A master’s degree in Cyber Security will potentially set you up for better job opportunities within leadership and management careers, and potentially a higher salary. While a master’s degree is not required for a successful career in network security, it can provide even more opportunities for graduates. 

    network_security_degree_UAT6

    UAT students and professors meeting in the Security Operations Center. 

    3. Does a Network Security Career Path Have Job Security? 

    Everyone providing online data needs network security. In 2022, cyber threats are more prevalent than ever, and they will only continue to grow. Strong network security can protect data from being breached. Data can come from many different places, and most of the time, releasing it is unintentional. Network security protects even the most unintentional actions from being exploited. Strong network security professionals can also fight back against these attacks, should they occur. The goal is prevention, but the job is protection. A degree in network security gives a graduate both of these skills.  

    4. Do I Need a Network Security Degree to Get a Job in Network Security? 

    While it is possible to earn a career in network security without a degree, your chances of gaining the most up-to-date and valuable information are severally threatened. You are also less likely to receive the higher salaries that network security professionals with a degree receive. Thanks to the internet, there’s a wealth of free information out there to take advantage of, but that information will only take someone so far. You also run the risk of receiving inaccurate information if it’s from an outdated or non-accredited source. A degree is the most surefire way to get the skills, mentorships and connections you need in order to achieve the career you want. 

    Industry expert and UAT’s Program Chair of Cyber Security, Aaron Jones says, “The Network Security degree is valuable because it functions as the litmus test necessary to enter the job market."

    Professor Jones goes on to explain, "It is common for influencers and even news organizations to make wild claims about how technology is an open career path that requires little or no education. The truth is that many jobs do and will continue to require a degree to enter, and some of the most lucrative career paths will continue to require higher education for admittance.” 

    The job market for cyber and network security is extremely competitive as everyone wants to have the best protection for their private data. A degree in Network Security will give a graduate the chance to properly compete for a network security career of their choosing. 

    network_security_degree_UAT5

    UAT Cyber Security Professors, Aaron Rodriguez and Jeremy Bunce observing students meeting in the UAT Security Operations Center. 

    5. Career Outlook for Network Security? 

    According to the U.S. Bureau of Labor Statistics, the job outlook for information security in 2022 is projected to be around 33%. The average job outlook for most careers is only 8%, making network security one of the fastest-growing job markets. 

    Every time a company is created, they need some level of network security to protect data. Whether it’s a customer’s data, their own, or important financial information, it’s invaluable to make sure it’s protected.  

    6. How to Choose a University with a Network Security Degree

    If you’re asking yourself where to earn a Network Security degree, you’ve come to the right place!  

    UAT is accredited by the Higher Learning Commission, an institutional accreditation agency recognized by the U.S. Department of Education.

    Also, University of Advancing Technology is a designated Center of Academic Excellence - Cyber Defense Education (CAE-CDE) institution through the National Information Assurance Education Training Program (NIETP). Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS), NIETP operates under national authority as the national manager for cyber defense education and training relating to national security systems. 

    This means that the most valuable and up-to-date technology and teaching methods are provided to UAT Network Security degree students. Students also get the opportunity to synergize their work and apply it, so they go into their chosen careers with experience already under their belt. UAT places a high value on demonstrated mastery and workplace readiness throughout its curriculum to ensure graduates are prepared for their technology careers. 

    If you think a Network Security degree sounds exciting, or you simply want to know more about it, request information or apply today.

    read more
    less

    UAT Cyber Security Professor Aaron Jones


    Professor Aaron Jones on Studying Cyber Security at UAT University of Advancing Technology (UAT) offers one of the longest-running Cyber Security degrees ...

    Professor Aaron Jones on Studying Cyber Security at UAT

    University of Advancing Technology (UAT) offers one of the longest-running Cyber Security degrees in the Southwest with a complete continuum of undergraduate and graduate degrees. A degree from the University trains students to be some of the best in the field of cyber security, while giving them the freedom to explore other technology disciplines. Professor Aaron Jones explains how mentorship plays a part in this.

    “My name is Aaron Jones and I'm the Program Champion here for the University of Advancing
    Technology for our cyber security group of majors. I have been here for a couple of years now and in addition to that, I also work in the industry as a cyber security analyst for a local law
    enforcement organization. Here at the University of Advancing Technology, you can earn a degree in Technology Forensics, Network Security and Network Engineering or a master's degree in Cyber Security."

    UAT_security_operations_center

    “Every single student is a cyber security ambassador, and it's their responsibility on day
    one to step into the shoes of a cyber security student and eventually cyber security expert. What
    I find with a lot of my students is that there's an overlapping interest. You can explore in a very
    safe environment, so I have students who, while pursuing a cybersecurity-related degree, will
    interact with our game development professors. While not necessarily directly connected to their
    degrees, there are things that interest them and inspire them."

    “What we encourage and what we build on here is developing both that internal network and that internal relationship building of working with your peers. Here within the University of Advancing Technology, mentorship is incredibly important. What I like to do is work with industry partners to make sure that our students are able to go out and participate in things like internships and externships. What I’ve found is that industry partners love that. That's the beauty of the program itself; it's designed for you to come in at any skill level and still learn something, still build, still develop and then still set you on a trajectory in the direction that you want to go.”

    Should You Major in Cyber Security? 

    UAT is a designated Center of Academic Excellence - Cyber Defense Education (CAE-CDE) institution through the National Information Assurance Education Training Program (NIETP). Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS), NIETP operates under national authority as the national manager for cyber defense education and training relating to national security systems.

    If you a natural problem solver, fascinated by information technology (IT) and the protection of privacy, data and more, a cyber security degree might be right for you. Request more information to find out more about the network security degree curriculum, potential outcomes and more. If you're ready to take the next step, apply for acceptance today! 

    Watch Professor Aaron Jones' full video here: 

    {% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True, viral_sharing=False, embed_button=False, autoplay=False, hidden_controls=False, loop=False, muted=False, full_width=False, width='1280', height='720', player_id='86817302417', style='' %}
    read more
    less

    Professor Aaron Jones on the Value of the Network Security Degree


    Interested in a Future in the Field of Network Security? Aaron Jones, the University of Advancing...

    Interested in a Future in the Field of Network Security?

    Aaron Jones, the University of Advancing Technology (UAT) Cyber Security Program Chair, is an incredible resource to gain a glimpse into the Network Security degree and what happens after you graduate.

    When not training the next generation of cyber security industry experts at the University (UAT), Professor Jones is also an AZ Peace Officer Standards and Training certified General Instructor, a software developer who creates applications for law enforcement agencies and an experienced public speaker. Read on to learn what to expect from UAT's Network Security degree straight from the subject matter expert.  

    professor_aaron_jones_UAT

    Why is a degree focused on Network Security valuable? 

    A degree in Network Security from UAT is valuable because it functions as the litmus test necessary to enter the job market. It is common for influencers and even news organizations to make wild claims about how technology is an open career path that requires little or no education. The truth is that many jobs do, and will continue to, require a degree to enter. Some of the most lucrative career paths will continue to require higher education for admittance.

    Obtaining a network security degree will help you get into the fields that matter. A cursory glance at LinkedIn job search using a Bachelor of Science in Network Security reveals jobs such as Web Application Developer, Project Engineer, Cloud Engineer and Cybersecurity Analyst II to name a scant few of the positions that require a degree.

    It is important to remember that career attainment follows a sliding scale. You will be in competition with individuals from a wide array of backgrounds and experiences, so it is important to not only obtain the skills necessary but to also be able to demonstrate how those skills make you a better choice than the next person. Therefore, obtaining a network security degree while pursuing internships, externships and other job-related pursuits will each combine to allow you to beat out the individuals you may be in competition with.

    What kind of student would enjoy a network security career?

    Students who fancy themselves guardians and protectors will enjoy network security. Your job will be to protect networks, users, and their data. You will be a vital player in most aspects of the business, and your job will oftentimes require experience in, and mastery of, many different aspects of the cyber world. You will often be required to brief others on situations and come up with plans for recovery when times are tough.

    The most important aspect of cyber security is a willingness to tackle tough challenges, immerse yourself in continuous education, and to have a desire to be better every day. You cannot enter a career in cyber security with a desire to grow stagnant. You will need to constantly familiarize yourself with new tools, understand your enemy, and be prepared to take action as needed. It's a lot of effort, but if you like to be active, you will enjoy cyber security.

    What does the path to a Network Security degree look like? 

    Your experience will vary, and I would be remiss if I did not urge you to consider how you plan to participate in your education journey. You can choose to sign up for school, participate at a baseline level, and then graduate without any additional effort or expenditures. Don't do this. Your journey can consist of events, competitions, and opportunities that you should take advantage of. As a student, you should be seeking out methods to make yourself stand out from others. You are in direct competition with every other candidate, and you should treat it as such.

    A student who wants to see success after they graduate will sign up for classes, network with their instructors and fellow students, and participate in the variety of opportunities available to them. This can include numerous events that would be available, and at UAT will be advertised during classes, by the faculty or in the cyber security student Discord channel.

    The journey of earning a degree in Network Security can be daunting but with perseverance and a willingness to make the most of it, you will find it to be fun and exciting. You will also develop relationships that may last years or decades after you graduate. You will discover that the cyber security field is remarkably tight-knit and full of interesting characters you will run into again and again.

    What types of special projects, internships etc are available? 

    For UAT students, there are special projects, internships and more that they will get exclusive opportunities for. Students can work as interns for several government agencies, participate in externships with numerous companies, and many have been employed by companies in the local area as well. Our students are often urged to give back to the community, and several of our students have participated in supporting educational institutions, such as local high schools, worked as interns in law enforcement cyber positions and provided technical support for high school level cyber competitions.

    The UAT factor is a willingness to give back to the community and to work towards improving the cyber footprint of not only Arizona but also the United States as a whole.

    What should incoming students know before choosing UAT?

    Be ready to work, volunteer when you can, and don't hesitate to ask questions and stretch your comfort level. You will need to familiarize yourself with a plethora of tools and be ready to constantly learn. The potential for success in this field is high, and you will discover that every effort will be rewarded if you are willing to try. Don't hesitate to pursue your interests in cyber security, even outside of the field because many professors and mentors at University of Advancing Technology are willing to give you a hand if you try.

    What innovative field developments are happening right now?

    Multiple regional conflicts have contributed to an increase in attacks on American infrastructure and cyber security expertise is in high demand. Now is the best time to get started in pursuing cyber security as a career and your skills will be put to use in almost every field you may be interested in. The sky is the limit, especially right now.

    What are some potential Network Security degree outcomes?

    I am of the opinion that the cyber security field is a high potential outcome field with plenty of opportunities. Cyber security is an important aspect of nearly any business and the need for professionals who can work in this field does not seem to be slowing down. You simply cannot run a business successfully without securing that business, and while some are willing to take the risk, we are consistently seeing that any hubris is rewarded with severe damage to the business.

    You can work in the cyber security field in a generic role, in a security operations center, as an analyst, in systems administration, or as a software developer to name a few jobs available to someone with a degree in Cyber Security. You should begin looking for jobs as you enter your first year in school. I recommend this because it gives you time to start choosing jobs that interest you while aligning your choices of class and extra-curricular activities towards a convergence that gets you into the position you desire.

    How to take the next step toward Network Security #TechRespect

    University of Advancing Technology is a designated Center of Academic Excellence - Cyber Defense (CAE-CD) institution through the National Information Assurance Education Training Program (NIETP). Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS), NIETP operates under national authority as the national manager for cyber defense education and training relating to national security systems.

    Ready to get started? First, request more information about UAT's Network Security degree and get connected to an admissions advisor to get all of your questions answered and explore life at UAT further to help you decide if this is the right path for you.

    Already done all that? Register for our next UATx, schedule an in-person or virtual tour led by a UAT Student Ambassador, or apply for acceptance today! Your future creating and innovating technology awaits!

    read more
    less

    Cyber Security Students Welcome Their New Peers with a Challenge


    Current and New Students Come Together for Capture The Flag On September 2nd, after two days full of connection-building activities for the new students of University of Advancing Technology (UAT), many embarked on their journey into the challenging...

    Current and New Students Come Together for Capture The Flag

    On September 2nd, after two days full of connection-building activities for the new students of University of Advancing Technology (UAT), many embarked on their journey into the challenging world of network security. That evening, several seasoned students hosted a Capture The Flag event for incoming students in the University's (UAT) Security Operations Center (SOC). Cyber Security Associate Professor, Jeremy Bunce moderated the event for all participants.

    "As a way to help build the cyber community here at UAT, the current students wanted to run an event for the new incoming students joining UAT this Fall semester," says Bunce.

     

    UAT_Jeremy_Bunce_CTF

    Jeremy Bunce is also an alumnus who graduated from UAT in 2019 with his Bachelor of Sciences in Network Security and Technology Forensics. As a prior Student Ambassador and actively involved student, Bunce understands what it's like for those new to the university. 

    "It was awesome to see the more senior students wanting to reach out and welcome the new students," says Bunce. 

    What is a Capture The Flag event?  

    A similar concept to the game you may have played as a kid in gym class or your friend's birthday party, Capture the Flag is also a well-known cyber security event where two teams battle to demonstrate their skills attacking and defending computer resources. 

    "The challenge consists of finding a hidden string in text called a flag. The challenges range from finding a file inside a word document to decoding a message to get the flag," Bunce explains.

    University of Advancing Technology has hosted many Capture The Flag events previously for students and the community, like CodeDay and more. Therefore, it's in full UAT fashion to introduce competitive challenges like this to help new students establish those critical early connections. It also exposes them to UAT's methodology of utilizing each other's strengths and technological skills to solve complex problems and work together to build something innovative. 

    Like the playing of Capture The Flag, the event planning aspect was collaborative as well.  "This specific event was designed last semester in the cyber security competition course we offer, with a mix of challenges that came from the students and myself." 

    Bunce shared that "the event went great with many talented freshman completing challenges." 

    capturetheflag

    Interested in Cyber Security? 

    Want to learn more? Explore UAT's cyber security degrees: 

    Keep up with all upcoming Cyber Security events hosted in UAT's Security Operations Center and the latest news from the UAT Cyber Security Newsfeed

     

    read more
    less

    A Network Security Degree: Requirements, Expectations and Applications


    It’s no secret that the more technologically advanced our world gets, the more we have to participate in it. This is great for connecting people worldwide and maximizing availability, but it introduced a rapidly expanding problem: network security.    What is a Network...

    It’s no secret that the more technologically advanced our world gets, the more we have to participate in it. This is great for connecting people worldwide and maximizing availability, but it introduced a rapidly expanding problem: network security. 

     

    What is a Network Security Degree?

    When you give your personal information out to third parties (or make your information available), it’s important to make sure that information is being protected. A degree from The University of Advancing Technology (UAT) in Cyber Security can give you the opportunity to develop ways to protect people’s private information, ethically hack, and gain a lucrative career in IT. Every company with information backed up electronically is in need of cyber security, so there are plenty of job opportunities awaiting.

    According to Aaron Jones, UAT’s Program Champion and Professor of Network and Cyber Security, “This degree is valuable in because it functions as the litmus test necessary to enter the job market. It is common for influencers and even news organizations to make wild claims about how technology is an open career path that requires little or no education. The truth is that many jobs do and will continue to require a degree to enter and some of the most lucrative career paths will continue to require higher education for admittance.”

    UAT has a few different Cyber Security degree programs. There are three Bachelor of Science degrees to choose from in this field: Network Security, Network Engineering, and Technology Forensics. To enhance knowledge and career opportunities, UAT offers a Master of Science in Cyber Security. All of these degrees give students of any experience level valuable information that can prepare them for the complicated, important world of cyber security. 

    UAT_Network_Security_degree_1

    Network Security student, Tyler Prettyman working in the Security Operations Center (SOC).  

    What Qualifications To Look For in a University's Network Security Degree Program?

    Before considering a network security degree program from any college or university, it's important to identify the ways its program is distinguished from all others. This includes looking at the institution's accreditation and any supportive industry recognition, partnerships, qualifications and more. Diving deeper, also reviewing the curriculum and talking to an advisor about mentorship programs, special projects or internships will help to further demonstrate the program's ability to provide you with a valuable education.  

    UAT is accredited by the Higher Learning Commission (hlcommission.org), an institutional accreditation agency recognized by the U.S. Department of Education.

    University of Advancing Technology (UAT) is also a designated Center of Academic Excellence - Cyber Defense Education (CAE-CDE) institution through the National Information Assurance Education Training Program (NIETP). Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS), NIETP operates under national authority as the national manager for cyber defense education and training relating to national security systems.

    All of this means that UAT is more than adequately able to prepare students for a real job in cyber security, supported by some of the best cyber security corporations in the country.

    UAT_Network_Security_SOC

    UAT_security_operations_center

    University of Advancing Technology's Security Operations Center (SOC). 

    Network Security Degree Requirements

    The network security degree program requirements combine studies with application. 

    Network security professionals work to keep information private, integral, and available. This specific degree focuses on theory application aligned with industry standards. Students in this degree program will have several objectives to prepare them for the cyber security workforce. 

    They will get the opportunity to create network designs that implement proper security measures and install and test existing security hardware and software tools. They will also construct their own policies related to cyber security and practice preparing for the worst-case scenario. There is also a focus on building ethical and legal understanding among students (so as not to create a bunch of evil computer geniuses). 

    Finally, students will get to research and evaluate several security-based threats and develop original systems to prevent cyber security threats and incidents.

    Network Security Degree Curriculum and Courses

    There are a number of valuable and interesting courses that make up the Network Security degree program.  A student’s network security foundational courses include Computer Forensic Essentials, Foundations of Network Engineering, and Network Engineering Hardware. These courses and more are designed to lay down the groundwork for network security as a whole. Students will learn what causes cyber-attacks, how modern networks operate and get preparation and practice for real tasks that must be performed by IT professionals.

    Next, the skill development courses of the Network Security degree from UAT focus on utilizing the fundamentals through application to develop and enhance their skills. These courses are designed to sharpen specific skills and interests. Courses include Introduction to Databases, Programming for Hackers, and Security Applications. 

    Students will learn how to track and record data, how to ethically hack and understand cyber defense techniques, and stay up to date on security applications and appliances they will likely be using after they graduate.

    The final set of degree-specific courses for network security students synthesizes knowledge from the previous courses and applies it to actual situations and organizations. Courses include Exploit Development, Network Defense and Countermeasures, and International and Federal INFOSEC Standards and Regulations. Students will learn what makes a network vulnerable, how to find vulnerabilities in a network and the specific ways a network can be defended.

    Many of these courses as well as general education courses from UAT also give students the opportunity to build on their portfolios. Additionally, each student is required to develop a Student Innovation Project (which has been compared to a state school's master's thesis) and complete boards in order to graduate. Through these projects and presentations, they prove themselves as innovators in network security, which is critical to achieving demonstrated mastery and job readiness.

    While this might sound like a lot, the reward is worth the invested effort. 

    “The journey of earning a degree in network security can be daunting,” says Professor Jones, “But with perseverance and a willingness to make the most of it, you will find it to be fun and exciting. You will also develop relationships that may last years or decades after you graduate. You will discover that the cyber security field is remarkably tight-knit and full of interesting characters you will run into again and again.”

    UAT_network_security_degree_8

    Who Is The Network Security Degree For?

    As Professor Jones puts it,  “Students who fancy themselves guardians and protectors will enjoy network security. Your job will be to protect networks, users, and their data. You will be a vital player in most aspects of the business and your job will oftentimes require experience in and mastery of many different aspects of the cyber world. You will often be required to brief others on situations and come up with plans for recovery when times are tough.”

    Moreover, anyone with a passion for cyber security may find this degree intriguing. Network security can be beneficial to personal router usage and, of course, corporation routers. When a network is properly secured, it can protect data from being taken and/or destroyed. This is extremely important for corporations that deal with sensitive, personal data from their customers. 

    This is more than just leaked phone numbers (although, those are also important to protect). Working in network security could allow you to protect people’s social security numbers, medical information, addresses, and more. Ultimately, by protecting people’s information, you can save their lives.

    You may wonder, “Is a degree in cyber security worth it?” It is if you’re confident enough to explore one of UAT’s most challenging degree programs and crave a fulfilling, lucrative career. Fortunately, there are a myriad of careers in cyber security that a network security major can explore.

    UAT_Network_Security_Degree_4

    Network Security student, Tyler Prettyman working in the SOC in his UAT hacker hoodie

    Are You The Next UAT Network Security Innovator? 

    UAT students in the network security degree program also get access to special opportunities to work as interns for several government agencies, participate in externships with numerous companies, and have been employed by companies in the local area as well. No matter what path they take, the Network Security degree opens many doors to exciting careers.

    If you have a knack for solving complicated problems and foreseeing complications before they occur, network security could be for you. It is also a lucrative career that persists throughout economic struggles and technological evolution, which guarantees a consistent need for network security professionals.

    UAT students get hands-on experience with their peers and professors that provides valuable, versatile information no matter where a student ends up after graduation. Students of varying skills and interests will have the opportunity to explore those while maintaining a focus in cyber security. This ensures every graduate has the foundational skills necessary for the cyber security workforce regardless of where their interests lie. The Network Security degree will give students the ability to not only comprehensibly understand tasks and procedures involved in cyber security but choose specific paths related to it and maximize their chances of success.

    Learn more about becoming an ethical hacker through UAT's Network Security degree. Get connected with a UAT Admissions Advisor to help you with the next steps to getting you all the information you need, or apply for acceptance now.  

    read more
    less

    Meet Hunter Autrey, Cyber Security Alum


    Well Deserved #TechRespect When students graduate, it's always a bittersweet moment. It's sad to no longer see them around campus working, on projects, and hanging with friends, but we are so proud to watch them grow and land amazing jobs! Hunter Autrey is no exception—from putting...

    Well Deserved #TechRespect

    When students graduate, it's always a bittersweet moment. It's sad to no longer see them around campus working, on projects, and hanging with friends, but we are so proud to watch them grow and land amazing jobs! Hunter Autrey is no exception—from putting in hours in the Security Operations Center (SOC) to securing a Network Administrator position—he's had quite the journey at UAT. After graduating from University of Advancing Technology (UAT), we caught up with recent graduate, Hunter Autrey, and asked about his post-graduation plans.

    Hunter's Experience

    After completing college and getting my Bachelor’s in Network Security, I am finally starting off my career as a Network Administrator. This is going to be my first “real world” job, and I couldn’t be more excited for this opportunity. The company I am working for has put me through eight weeks of training to really get the knowledge and information flowing. After training, I will continue into the work force where I'll be securing the network and and making sure it's working appropriately—monitoring network performance (availability, utilization, throughput, goodput, and latency), testing for weaknesses, installing and integrating new hardware, and even keeping an eye out for any out-of-date software needing to be updated. 

     

    UAT Cyber SOC

    Without the help of UAT, the courses they offered, and the accelerated options, I would not be where I am today. Every teacher I had, helped me more than they'll ever know. There were many opportunities for me to go outside of class time to set up servers, and to teach kids and their parents about both UAT and the Network Security program. I also had the opportunity to ask my professors for tips and tricks on how to do certain things. Professor Aaron Jones went above and beyond for all his students. He showed that he cares for us, and he was always trying to get us cool and exciting networking opportunities. Professor Jones is the one who pushed me to apply for the Greater Phoenix Chambers Cyber Security externship. From this externship, I expanded by network, learned so much about different companies, and how those companies utilized their cyber security.

    I couldn’t be more grateful for everyone at UAT—for everyone who pushed me to do my best, allowing me to succeed in my studies, and getting me to where I am at today. All the hard work over the last two years and eight months has been well worth it. I now know that if I put my mind to a certain project or objective, I can get the work done. Going into this field, I knew I was never going to stop learning. I strive to continue learning, and pushing myself until I am known throughout the cyber security field, doing my very best! 

    IMG_1938


    Interested in studying cyber security? UAT Network Security degree students use critical thinking to research current and evolving cyber security trends and become experts in network security industry standards and regulations. Graduates from the cyber security program will have the essential knowledge and experience to automate their own security processes through extensive training in network security programs and scripts, and be prepared for careers in government and multinational corporations seeking certified ethical hacking professionals.

    read more
    less

    The Beginning Beginners Guide to Linux


    What is Linux? Linux is an operating system for cars, phones, supercomputers, and home desktops. You can use Linux and probably have used it on any number of devices since the mid 90's. Most of the internet functions because of Linux and all the world's top supercomputers are running Linux as well. It...

    What is Linux?

    Linux is an operating system for cars, phones, supercomputers, and home desktops. You can use Linux and probably have used it on any number of devices since the mid 90's. Most of the internet functions because of Linux and all the world's top supercomputers are running Linux as well. It is the secret sauce that makes the world of business and science go round.

    The operating system itself is composed of numerous pieces that work in harmony to produce what you see or deal with daily. You will find a bootloader, kernel, init system, daemons, graphical server, desktop environments, and applications when working with Linux and each of these items can be dictated to you or be a deciding factor in choosing your installation method. Hate SystemD but really love a specific desktop environment? You may need to use something like Devuan Linux. Just looking to get your toes into the Linux waters. You can start with Ubuntu or Manjaro.

    You can choose which Linux distribution to start with by self-measuring your skills. Are you a computer novice? You may want to explore Ubuntu. Feeling more confident in your skills? Try Manjaro. Are you a super powered user? Install Gentoo! No matter which distribution you choose, you will find yourself growing and learning and that is the most important aspect of choosing Linux.

    Let us know which copy of Linux you chose! We would love to hear from you.


    SECURE YOUR FUTURE WITH A CYBER SECURITY DEGREE

    Network Security degree students will use critical thinking to research current and evolving cyber security trends and become experts in network security industry standards and regulations. Graduates from the cyber security program will have the essential knowledge and experience to automate their own security processes through extensive training in network security programs and scripts, and be prepared for careers in government and multinational corporations seeking certified ethical hacking professionals.

    Don't wait. Apply now!

    UAT Cyber SOC

    read more
    less

    Life Saving Skills Learned at C2 Event


    Training for Situations, Hoping They Never Happen On Monday, May 16, 2022, UAT student Emilio Cress and Professor ...

    Training for Situations, Hoping They Never Happen

    On Monday, May 16, 2022, UAT student Emilio Cress and Professor Aaron Jones participated in a local escape and evasion course put on by C2Tactical, a local range and training facility. Students were afforded an opportunity to learn about several methods of restraint that have been used in kidnappings and methods by which those restraints could be broken or otherwise defeated. This included zip ties, duct tape, handcuffs, and rope. A briefing on the types of restraints, their uses and weaknesses, and the methods by which they are deployed by the bad guys was demonstrated through both presentation as well as hands on experience.

    "I like the fact that we can empower our students with skills that could potentially save their lives. We talk about cyber security every day, but the world is a dangerous place and it seems to always be growing more so. Students have to make a decision on what extra curricular items they want to participate in and, by providing opportunities like this, UAT is putting the safety and security of our most important assets first," Professor Jones spoke when asked why he was at the event with his student.

     

    {% video_player "embed_player" overrideable=False, type='scriptV4', hide_playlist=True, viral_sharing=False, embed_button=False, autoplay=False, hidden_controls=False, loop=False, muted=False, full_width=False, width='1080', height='1920', player_id='74413131611', style='' %}

    "Any knowledge learned is still knowledge and time well spent. Realistically, will I ever use the skills I learned in the course? Hopefully not. But for taking two hours out of my day, I learned the skills that could potentially save me from a life-threatening situation. This isn't curriculum that is typical of most universities, and there might even be a taboo around being taught these things, but I am thankful to Professor Jones and UAT for allowing other students and me the opportunity to get out and learn skills with real life applications," shares Emilio about his experience at the C2 event.

    Physical security is in the same realm as cyber security. We spend hundreds of hours learning how to secure our home network, but never just our home.


    UAT cyber student project (1080 x 1920 px) (1200 x 800 px) copy 3-jpg

    Interested in studying cyber security? UAT Network Security degree students use critical thinking to research current and evolving cyber security trends and become experts in network security industry standards and regulations. Graduates from the cyber security program will have the essential knowledge and experience to automate their own security processes through extensive training in network security programs and scripts, and be prepared for careers in government and multinational corporations seeking certified ethical hacking professionals.

    read more
    less

    Brute Force Attacks


    What does brute force mean? Brute force attacks are a method by which many login attempts are made to gain access to a system. WordPress is a free and open-source content management system that is used by 41.4% of the top 10 million websites on the internet. The two go together perfectly and attackers...

    What does brute force mean?

    Brute force attacks are a method by which many login attempts are made to gain access to a system. WordPress is a free and open-source content management system that is used by 41.4% of the top 10 million websites on the internet. The two go together perfectly and attackers regularly target WordPress based websites using brute force methods.

    Most websites running WordPress follow some simple rules. One of those rules is that the login page can be located at the "domain.TLD/wp-login.php" URL and that many of the setups are poorly configured without much in the way of security or preventative maintenance. Therefore, you can use some commonly available tools to quickly attack these sites to gain access to the underlying administration panel beneath.

    There exist tools such as WPForce that can be ran in combination with a Username List as well as Password List to brute force these sites. While some individuals will rightfully state that this type of attack is also referred to as a Credential Stuffing attack, they cannot argue that it is not effective and simple. You simply load up your application, pass on your credentials, and wait for confirmation—or pivot—if you discover your method is not going to work on that site.

    Once you have gained access to the website, you can next use the tool Yertle to attain persistence, activate meterpreter, load a keylogger, dump all of the hashes for the current passwords, and get the database credentials. This is a one stop shop for attackers and the tools themselves are simple to use. Yertle and WPForce are written in 96% Python and 4% JavaScript.

    How do you fight it?

    Individuals interested in protecting their webservers, developing defenses against these attacks, and preventing brute force or credential spraying attacks must understand the tools used to conduct the attacks themselves. By familiarizing yourself with these tools and their use, you can strategize how to defend yourself from the danger they pose.

    7-2

    Interested in studying cyber security? UAT Network Security degree students use critical thinking to research current and evolving cyber security trends and become experts in network security industry standards and regulations. Graduates from the cyber security program will have the essential knowledge and experience to automate their own security processes through extensive training in network security programs and scripts, and be prepared for careers in government and multinational corporations seeking certified ethical hacking professionals.

    read more
    less

    Surveillance Capitalism: The Cost of Data


    Watching for a Pay Day Surveillance capitalism is the act of earning money from surveillance in the simplest terms. Large companies who have access to massive data sets can reduce uncertainty and identify the probability that a future action will be taken by people. Many of these companies are...

    Watching for a Pay Day

    Surveillance capitalism is the act of earning money from surveillance in the simplest terms. Large companies who have access to massive data sets can reduce uncertainty and identify the probability that a future action will be taken by people. Many of these companies are collecting data about people in bulk, distilling it, and reselling that data to advertisers or companies to assist them in bolstering their ability to sell products.

    The secondary use for large data sets is surveillance. If you can collaboratively build a dossier or database on someone, it is not a large stretch to apply the knowledge you have gained to matters of national security. However, this massive gathering of data that was once the business of governments is now being used by corporations and this has shifted the power structure tremendously from the government towards these organizations.

    PokemonAn excellent and often cited example of surveillance capitalism is the game Pokémon Go. Pokémon Go is a game in which your location is tracked constantly, and your behavior distilled as you are provided "Pokemon" and other rewards for your efforts. This data can then be used to match photographs, time spent, network connections, phone activities, and more to a database that can then identify what products are more likely to sell to you and when and how they should be advertised.

    Understanding how technology works, what the uses for that technology are, and how our privacy intersects with our comfort is of utmost importance. As a cyber instructor a the University of Advancing Technology, I take privacy and security very seriously, and our classes are designed to make you ask and answer some of the toughest ethical questions in the industry. 

    Surveillance 2


    Earn a Degree In Cyber Security at UAT

    UAT offers a Master’s of Science in Cyber Security, as well as bachelor’s degrees in Network Engineering, Network Security, and Technology Forensics. Our Cyber Security Degree for Ethical Hackers and Network Security Curriculum has been certified through the NSA/DHS National Information Assurance Training Program in Information Assurance and Cyber Defense.

    read more
    less

    Dealing with Identity Theft


    "Identity theft is not a joke, Jim!" Preventing identity theft can sound like a daunting task. We live in an era where our data is being gathered, saved, combed through, and redistributed at the speed of light—and somewhere during all of that it is often being lost of...

    "Identity theft is not a joke, Jim!"

    Preventing identity theft can sound like a daunting task. We live in an era where our data is being gathered, saved, combed through, and redistributed at the speed of light—and somewhere during all of that it is often being lost of improperly stored. This has increased the likelihood that you or someone you know are going to be affected by identity theft in some capacity of the next few years.

    If you discover that your identity has been used to commit fraud, the first step is to report this to the company where you know the fraud has occurred. This could be a credit card, bank, or cell phone provider, but they all have fraud departments, and you should explain that your identity was stolen and request that they close or freeze the accounts. If you owned the account, you should attempt to change logins, passwords, and pins if possible. You may be asked to file a police report, and this can often be done quickly and online through your local police departments website.

    You can then contact Experian, Transunion, or Equifax to report the fraud and ask for a fraud alert to be placed on your accounts. You should need to only contact one as they are obligated to inform each other if there is fraud discovered. Asking for a credit report is a good idea as you may wish to check for accounts or transactions you do not recognize.

    You can also file an identity theft report to the FTC at https://identitytheft.gov and ask them to assist you with creating a recovery plan. The report you file to the FTC provides you a guarantee to certain rights you have as well.

    Further steps will require you to close those bad new accounts, remove bogus charges, correct your credit report, add a free or extended fraud alert to your accounts, and more. You may even need to report a misused social security number, replace government issued IDs, and work to clear your name of criminal charges as well.

    This is a lot of work, but with enough time and perseverance, you can eventually fix the issues you are facing related to identity theft.

    Or...

    Just click this link.

    .

    .

    .

    .

    Did you learn nothing? 😂Identity Theft 2


    Interested in studying cyber security? UAT Network Security degree students use critical thinking to research current and evolving cyber security trends and become experts in network security industry standards and regulations. Graduates from the cyber security program will have the essential knowledge and experience to automate their own security processes through extensive training in network security programs and scripts, and be prepared for careers in government and multinational corporations seeking certified ethical hacking professionals.

    read more
    less

    If You Choose To BeReal, Will You Be Safe?


    New Social App Combines Reality with Risks Applications like BeReal and TikTok are often in the news due to security concerns, but most users are ignorant to the dangers posed by these tools. TikTok was released in September of 2016 and BeReal...

    New Social App Combines Reality with Risks

    Applications like BeReal and TikTok are often in the news due to security concerns, but most users are ignorant to the dangers posed by these tools. TikTok was released in September of 2016 and BeReal started sometime in January of 2020. Both applications encourage users to create media of their immediate surroundings and collects a phenomenal amount of data from users.

    Sometime around September 22nd of 2021, a user of TikTok who was working on a military installation created a video of an unknown aircraft or frame. This clip was allegedly shared with Air Combat Command Chief General Mark Kelly who reportedly spent some time studying the video. The creation of this video was considered a grievous OPSEC violation. It is believed the aircraft was US stealth technology currently undergoing testing, which was posted to the Chinese government affiliated platform. It is important to remember that the Chinese passed laws in 2017 that state, "any organization or citizen shall support, assist and cooperate with the state intelligence work in accordance with the law."

    BeReal requests that users create a photo using both cameras on a phone simultaneously that can then be used to create a "more authentic" image of what is happening around the user. Some users refer to it as a more relaxed or "real" Instagram. However, users who deploy this application while in secure facilities or while operating around sensitive data can reveal much more than they expected.

    BeReal1 BeReal2 BeReal3

    Users of these social media applications should be educated on the danger posed by their devices and how important it is to safeguard the data that they are exposed to regularly. Providing images of secure facilities or secret tools can damage the safety and security of the nation and while the applications themselves may only be a means by which data is collected, users of these applications are often deploying them in the wrong place and at the wrong time.


    UAT offers a Master’s of Science in Cyber Security, as well as bachelor’s degrees in Network Engineering, Network Security, and Technology Forensics. If you believe a career in cyber security may be right for you, request information about our degree programs.

    Cyber Security Passion

    read more
    less