Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.
Required Fields Are Highlighted
University of Advancing Technology is an elite, private college that serves its student body by fostering knowledge creation and academic excellence in an environment that embraces the young technophiles of the world. With three centers of research and a suite of technology-centered undergraduate and graduate degrees, the University is a recognized leader in technology education.
Students, you have 48 hours. The mission is to include one specific prop and one required line of dialog in your film. Now, go make a movie! UAT Digital Video...
Opportunities in Cyber Security heat up during the summer with well-known industry events like Black Hat and DEF CON!
Each summer, UAT Cyber Security students can apply to work as paid volunteers at the iconic Black Hat Briefings in Las Vegas. No, they aren’t there to party! At Black Hat, they gain industry experience in setting up networks, WiFi connections, routers, switches, and much more. This internship alone can open so many doors for students looking to network and break into the industry upon graduation.
The day after Black Hat ends, DEF CON begins and many students stick around to attend or work at DEF CON, as well. Occasionally some lucky students who showed promise at Black Hat have been asked to work as DEF CON Goons, aka security, which is an honored privilege.
DEF CON is full of hacking activities like Capture the Flag (CTF), Pentesting, and the Lock Picking Village as well as vendors and companies from all aspects of the Cyber Security world. While at Black Hat or DEF CON, students may find solid job opportunities by simply immersing themselves in the industry and networking with professionals in the field. Don’t miss out!
Some very dedicated UAT Network Security students have been practicing as a team for the upcoming Western Regional Collegiate Cyber Defense Competition (WRCCDC) in March, but in order to reach...
Cyber Security alumni have created a startup company for penetration testing called AntiMatter Security, LLC.
The team consists of William Peterson (Network Security, Technology Forensics), Stephen Chicosky (Network Security, Network Engineering), Kenny Welch (Network Security), Roger Brambila (Network Security, Advancing Computer Science) and Roger Allen (Network Security, Advancing Computer Science) all who earned their degrees from UAT. These students have been to Black Hat Briefings as paid volunteers in the past. This year, they will return to the conference as trainers teaching two 2-day classes they developed called “Attacks Over GSM With Project Mayhem.”
Participants will immerse themselves in the world of hacking while learning new attack techniques to help defend networks. They will also learn to combine Red Team and Pen-tester prowess to create a less common attack tool, a device that participants will build at the training and can take home with them. With the new Project Mayhem Kit, it’s easier to think like a hacker thinks, engaging in a live environment with an innovative attack tool that you will build and deploy. In this completely hands-on training, you will demonstrate your new abilities to hack air-gapped systems and bypass perimeter defenses over a GSM network.
A lot of credible information will be disseminated at the training including the following topics: Configuring Mayhem Kit, Basic Scripting Logic, Windows Exploitation, Linux Exploitation, Bypassing Perimeter Defense Systems, Social Engineering Concepts, Covert Concealment and Placement Techniques, Red Team Activity, Data Extraction, Isolating and Exploiting the Target and more.
The training sessions are already sold out. More information on the class can be found here.
You can also purchase a cool baseball hat to support Antimatter Security.
Help spread the word. Like Antimatter Security on Facebook!
It’s the time of year again! UAT is excited once again to participate and sponsor Tempe Geeks Night Out. UAT will have lots of cool tech to show off such...
The results are in! Out of 17 teams competing in the CCDC Qualifier, UAT had to place 8th or better…
UAT placed 3rd overall and took 1st in the defense category. Congrats to this amazing group of dedicated Network Security students.
Currently UAT is the top Arizona College coming out of the 2018 CCDC Qualifier. Next stop is the regionals.
Here are the standings:
1 – Cal Poly Pomona
2 – Stanford Univ.
3 – University of Advancing Tech
4 – CSU Northridge
5 – UC Riverside
6 – San Diego State Univ.
7 – National Univ.
8 – Arizona State Univ.
UAT will be taking the big white van to the Regionals in March!
The UAT WRCCDC Team consists of Robert Thompson, Eric Dodge, Kelvin Ashton, Jeremy Bunce, Mitchell Blystone-Pemberton, Adam Morris, Jordan Rude and Luke Schloesser.
Team alternates include Josh Mikkelson, Ashley Pearson, Lily Spear and Jackson Nestler, who were in the room during the competition observing.
UAT Game Studios students and alumni from Monster Vault Entertainment Studio will demo a VR snowball fight game called Chill Out, at Arizona Tech Council’s Tech the Hall’s After5 Tech...
Blog co-written by UAT Cyber Security Program Champion Greg Miles and Digital Media Maven Lauren Fach
Network security, or cyber security, is an industry where professionals are trained to prevent and monitor unauthorized access or attempts to access, misuse, or modify a computer network and network-accessible resources.
A network can be private, like within a company, school, business, or home and is designed to keep users out that do not have the correct login credentials. Other networks may be open to public access; an example would be the free Wi-Fi at Starbucks or a hotel. Many Network Security pros will warn against using public Wi-Fi and that you are operating a device at your own risk knowing that the connection is unsecured.
Important to Remember:
Threat – Something that can impact the operation of an organization. There can be natural threats (fires, hurricanes, disasters) or human threats (bombs, malicious hackers, nation-states, etc.)
Vulnerability – a weakness in a person, place, or thing
Impact – the result that can affect an organization should something occur
Risk – The combined effect of the Threats, Vulnerabilities and Impact
Hacker – Someone who enjoys discovering how things work. Remember hackers can use their powers for good or for evil and it is all based on intent
Ethical Hacking – The process of discovering vulnerabilities to improve the security posture of an individual or organization
Black Hat – Hackers using their powers for evil. Also the name of one of the most renowned annual security conferences
White Hat – Hackers using their powers for good
Gray Hat – Hackers that can’t seem to decide whether they are good or evil
Penetration Test (PenTest) – The process of identifying vulnerabilities and their exploitability to help an organization improve their security posture
At UAT, a Bachelor of Science degree in cyber security prepares students for the rapid paced online world of theft and corruption of data and information. UAT teaches a broad range of topics to the support the security professional to include network defense, incident response, business continuity/disaster recovery, security and risk assessment, and penetration testing.
From the desk of Cyber Studies Program Champion Greg Miles…
In working as an industry Security Consultant, I saw many different security discoveries that had a significant impact on the client’s operations.
In my experience, the biggest threats for all organizations today are the complacency and actions of individuals within an organization. From an accidental opening of access to sensitive information to the intentional operation of an unauthorized or even illegal business, the employees can knowingly or not, cause the most damage.
As an industry professional, I work to help clients identify security risks and make improvements to their security posture through a combination of closing vulnerabilities and continuous monitoring of their business operations.
Industry conferences such as Black Hat and DEF CON are important to attend because:
• Knowledge Transfer – The best and the brightest bring the newest information to these conferences. You also get to see the latest tools and techniques.
• Networking – A chance to meet the people that are setting the future for our industry
• Resume Builder – Having work experience or teaching experience at these conferences are great talking points when searching for employment
UAT students are afforded the opportunity to work at paid volunteers each summer at Black Hat, with some being asked to stay and work as DEFCON Goons.
Cyber Security alumni formed startup AntiMatter Security post graduation held a 2-day training last summer at Black Hat that taught industry professionals about their product, the Project Mayhem Kit.
Find out if a career in network security is in your future.
Back in 2016, UAT’s Digital Video Program teamed up with repeat collaborator Ayman Samman to produce a short film inspired by the “Arab Spring,” called “Toppled.” Samman, who starred in...
Some very dedicated UAT Network Security students have been practicing as a team for the upcoming Western Regional Collegiate Cyber Defense Competition (WRCCDC) in March, but in order to reach the regionals, they first must qualify.
The CCDC Qualifier takes place on Saturday, Jan. 27, and our students will compete from the Cyber Warfare Range on campus, from 10:30 a.m. – 4:30 p.m.
“UAT is competing against over 16 other colleges and we are all Blue Teams, defending servers against the CCDC Red Team. They have practiced their skills for months and I wish them all good luck this Saturday,” said Professor Wayne Kibbe.
The UAT WRCCDC Team has the brightest and most dedicated Network Security students that UAT has to offer. Thank you to Robert Thompson, Eric Dodge, Kelvin Ashton, Jeremy Bunce, Mitchell Blystone-Pemberton, Adam Morris, Jordan Rude and Luke Schloesser for filling out the competing roster.
Team alternates include Josh Mikkelson, Ashley Pearson, Lily Spear and Jackson Nestler, who may be in the room during the competition to observe.
Good luck Blue Team!
UAT attended CactusCon 2017 in the Robotics Village on Saturday, October 1, at Phoenix Convention Center. UAT Professor Joseph Horen showed off robot demonstrations as well as Arduino programming labs...
Join UAT Foundation and Warriors Heart in acknowledging Veterans Appreciation Day!
We know that active military, veterans, and first responders have a thirst to learn about technology.
This year, UAT is excited to host a Veterans Day Open House and Silent Auction Fundraiser on Thursday, Nov. 9, in an equal partnership formed between the UAT Foundation and Warriors Heart Foundation.
We invite any active military, veterans, and first responders to the Veterans Day Open House to celebrate our military locally and to learn more about cyber security. As a military-friendly school, UAT is excited to host a military-centric open house and information session for military personal interested in technology education.
This open house will offer prospective military students the opportunity to learn about our unique degree programs, tour our technology-infused campus, connect with faculty, learn about scholarships/financial aid, and meet with campus staff to see if UAT is a good fit for your future.
The service, dedication and sacrifices made by the men and women serving our nation in the United States military are recognized by University of Advancing Technology. Whether you are on active duty, are a reservist or are a veteran, UAT has a variety of program offerings, learning delivery options and financial aid opportunities that will allow you to achieve your educational goals in a way that meets your needs.
Whether you are seeking to advance in a civilian career, complement your military skills or pursue a fresh path in advancing technology, UAT is committed to your success.
UAT maintains ongoing relationships with several U.S. government organizations as a Center of Academic Excellence as designated by the National Security Agency and the Department of Homeland Security
Learn more about UAT’s Military Friendly School designation: http://www.uat.edu/military
The UAT Foundation is a scholarship foundation that seeks to locate and deliberately nurture individuals whose talents will make the world stronger through the creation of technology, ethically applied in society. Through scholarships designed to foster the learning of UAT students, the UAT Foundation exists to support the next generation of the change agents our world needs.
The Warriors Heart Foundation seeks to assist military, veterans and first responders in accessing PTSD, alcohol and chemical dependency treatment at Warriors Heart with a mission to provide treatment for those who put their lives on the line for our safety. The WH Foundation works tirelessly to assist those who put their lives on the line for us every day in their time of greatest need.
Your generous contribution will assist the University of Advancing Technology Foundation and the Warriors Heart Foundation in raising and award the funding that is critical to supporting our veterans and first responders into the next stage of their lives. Because both Foundations are 501(c)3 organizations, all donations are tax deductible.
Many UAT students will become entrepreneurs and start their own businesses after graduation. Professor Mark Smith teaches Business Technology courses at UAT and has some great tips for how to...
Blog written by student Michael Bradley, UAT Network Security/ Network Engineering student
Network Security is a growing field and with the increase in cyber warfare, it’s not slowing down. There has been a call to arms for more qualified applicants to enter the job market.
Currently, one the main issues that we face is consumer privacy, which includes encryption, email privacy, and call privacy. There are a lack of consumer items on the market that can fulfill this security for its consumers. What I am currently brainstorming is a cellular device and laptop with the perfect level of privacy and secrecy. A device that not only fulfills the need for privacy but also gives the consumer confidence in the device they own.
Currently, the only phones on the market with this plan are either over-priced or nowhere near user-friendly. Here are two examples:
The main one that strikes out is the Blackphone 2. The Blackphone 2 has a great concept. It takes everything the user wants in privacy incorporated into the phone, however the encryption isn’t exactly the highest to be achieved and there were many holes found in the security protocol for the phone.
It’s almost back to school time and UAT will be welcoming lots of new faces to campus. Being a new student on campus is exciting, but can be intimidating. That’s...
UAT held the 2nd Annual Cyber Security Open House on Thursday, Oct. 12, in conjunction with the national cause, Cyber Security Awareness Month.
UAT Cyber Security professors Wayne Kibbe and Mason Galatas teamed up to present a slideshow on the basics of cyber security and how to protect yourself the best you can from hackers.
Professor Wayne Kibbe said, “Cyber Security education is very important for several reasons. First, the demand for cyber security skills is rapidly growing and US Labor Department reports claim shortages for the foreseeable future. Second, as more and more devices connect to the internet, the chances of individuals getting hacked is increasing. A career in the field could be very rewarding by protecting not only individual consumers, but private businesses and government agencies as well.”
Some important takeaways from the presentation include:
Alumni Jesse Rogers, who studied Game Design at UAT, had the chance to compete in the final stage of Oculus’s The Unspoken VR Tournament for Oculus Rift Touch last month...
UAT has led the way in cyber security since the late 90s, writing the rule books for cyber security education in Arizona.
Marking over 20 successful years since the inception of its elite Network Security degree program, UAT is proud to participate in Cyber Security Awareness Month, during the month of October, allowing our faculty of experts to share important information on cyber security with the public.
UAT recognizes the importance of training cyber security experts, in its students, alumni, faculty and in local members of the community.
We have compiled a few tips and anecdotes about our students below.
Want to know more about cyber security from UAT’s experts?
UAT is hosting a Cyber Security Open House on Oct. 12, with industry experts, faculty and alumni to offer tips on how to stay safe online and talk about the importance of Cyber Security education to the public.
Learn more about protecting yourself online. Dive into what it’s like working for the Cyber Security Industry. Celebrate Cyber Security Awareness month on October 12, with a full slate of activities, industry talks, and topics involving some of industry’s top professionals. Don’t miss out on this incredible educational event!
What: UAT Cyber Security Open House
When: Thursday, Oct. 12, from 6:30-8:30 p.m.
Where: University of Advancing Technology: 2625 W. Baseline Rd. Tempe, AZ 85283
Why: To celebrate Cyber Security Awareness Month and educate the public on tips to stay safe online.
RSVP on Eventbrite, space is limited.
See you on Thursday night!
The Arizona Science Center is blowing up the night for a special adult-only event featuring a twist on science demos and experiments, a high energy DJ, specialty drinks and a...
Cactus Con is a local cyber convention that began in 2012 and has been growing each year. Considered to be Arizona’s Defcon, Cactus Con may be the biggest local/regional hacking, cybersecurity conference in Arizona – not to mention, it was started in part by UAT alumni.
This year Cactus Con will include a robotics village and organizers have asked UAT to run it. UAT Robotics Professor Joseph Horen will be on-hand at Cactus Con to show off robots, drones and answer questions about the program.
UAT will also bring Rasberry Pi and Arduino tech applications. The idea is to have a hands-on, interactive area where the kids and teens can experience building with this technology, including IoT devices and/or Bots that can be coded to do things.
UAT Network Security alumni and Antimatter Security COO Will Peterson said, “I can’t wait for this years’ Cactus Con! I’m happy to see professionals in local security groups getting involved in conferences and reaching out to the public. It’s great to have local talent collaborating for the better of our industry.”
What: Cactus Con
When: Saturday, September 30 from 8 a.m. to 4 p.m.
Where: Phoenix Convention Center
Cactus Con participants can attend a variety of workshops, presentations and break-out sessions. Some topics include Cloud computing, Covert communications, Cryptography, Incident response, Malware detection, Framework vulnerabilities, Mobile security, Network reconnaissance and Social engineering.
We hope to see you at Cactus Con on Sept. 30th!