Request Info

1st step 2nd step 3rd step
Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

 
 
Next
Previous
 
Next
University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.
Previous
 
Submit

ABOUT UAT
University of Advancing Technology is an elite, private college that serves its student body by fostering knowledge creation and academic excellence in an environment that embraces the young technophiles of the world. With three centers of research and a suite of technology-centered undergraduate and graduate degrees, the University is a recognized leader in technology education.

Learn More About UAT

    Special Topics in Technology: Open Source Intelligence


    Using Shodan to Look for Vulnerable Critical Infrastructure Students at the University of Advancing Technology are often tasked with real world goals designed to make them flex and grow while experimenting with genuine...

    Using Shodan to Look for Vulnerable Critical Infrastructure

    Students at the University of Advancing Technology are often tasked with real world goals designed to make them flex and grow while experimenting with genuine technology. One of those students, Aaron Miller, did a fantastic job while searching for potentially vulnerable infrastructure posing a threat to United States interests. As the Cyber Security program champion, I felt it was relevant to highlight the work he is doing and to showcase what UAT students are capable of accomplishing.

    Here is his description of the project:

    Using Shodan to find different internet facing devices and to identify those that may pose a threat was my assigned goal, and I discovered that, with a little research, you can use Shodan to find different industrial control devices. These ICS devices are used to operate different functions within a physical system remotely. The control unit can open valves, AC controls, and even chemical disbursement in a public drinking system, as a small example. Any mechanical device that needs to have functions related to physical control of a device but aren’t easily accessible may be attached to an ICS connectivity device. A little research on Shodan and you can find the proper syntax to find these devices.

    When researching the security of such devices, we can look for certain identifiers. These identifiers could be models, types, and manufacturer names. Using google you can find the manuals, and even default passwords. If, after research, you learn the common functions of the controller, you can identify the weaknesses of the system. It is also possible to get into the main network from that device and also cause havoc by misuse of the device.

    Network Security means protecting your systems that should be on the network, but it also means protecting devices you may not expect to see on a network. Proper documentation and diagrams of the network are crucial in making sure all ends of the network are secure. Audits and proper knowledge of your network will help when thinking security. By following best practices and following standards, you can stand on the shoulders of giants when designing your security footprint.

    Locating and reporting potentially vulnerable infrastructure using Shodan is ethical as well as legal, but going beyond that enters a gray area that we avoid. You should not abuse the information you might find about devices in their online manuals, but instead only use approved tools while following the laws. Security research doesn't mean making bombastic claims or causing Earth shattering upheaval to businesses but is about being a contributing member of society while giving an uplifting hand to others.

    View Aaron Miller's full description of Shodan:


    Interested in studying cyber?
    More about UAT’s Cyber Programs

    Our cyber security degree majors and cyber security lab are recognized by industry and government entities alike for their ability to help generate the future innovators of the cyber security industry. We focus on creating true leaders who will have mastery in ethical hacking and uphold the highest industry standard of cyber integrity in our quickly evolving world of cyber security technology and online security.

    Visit the University of Advancing Technology for more information on all our cyber security majors. 

    Ready to start? Apply now at uatfastapp.com.

    read more
    less

    To Tempe Town and Beyond


    There’s so much more to Arizona than the desert. For students new to the area, it would be easy to just stick around campus and play video games, but don’t do that! Take advantage of all that Tempe and the surrounding area has to offer. There’s something for everyone! Free things ...

    There’s so much more to Arizona than the desert. For students new to the area, it would be easy to just stick around campus and play video games, but don’t do that! Take advantage of all that Tempe and the surrounding area has to offer. There’s something for everyone!

    Free things

    Tempe Marketplace

    The Tempe Marketplace isn’t just for shopping—it’s also a place you can rock out with free concerts! Rock It Up features up-and-coming bands taking the stage just outside Dave & Buster’s throughout the fall. Plus, you can hang out at cozy fireplaces outside of Barnes & Noble.

    Picnic at Papago Park

    A really short hike up the Hole in the Rock Trail takes you to a spectacular view, so plan to take photos. Dogs are allowed, and unfortunately people are too… so don’t be surprised if it’s busy. Still, it’s a great place to picnic, walk, bike, and enjoy the natural beauty.

    Papago Park

    Gallery at Tempe Center for the Arts (TCA)

    If you enjoy the arts, the Gallery at TCA provides visitors rotating exhibits in a variety of themes, open year-round and with no admission cost. From local to international art, there is something for every art enthusiast. The Gallery is open Tuesday–Saturday from 10:00 a.m. – 5:00 p.m.

    USS Arizona Memorial Gardens at Salt River 

    The Salt River Memorial is a tribute to the US forces aboard the USS Arizona during the attack on Pearl Harbor. Open daily from dawn till dusk, the garden features a lighted column for each of the lives lost, as well as an unlit pillar for each who survived. The Memorial is located between the Salt River Fields and Great Wolf Lodge on the Salt River Pima-Maricopa Indian Community.

    Tempe History Museum

    At the Tempe History Museum, you’ll find a Main Gallery, Featured Exhibit, and Community Room Gallery, all open to the public and free to view. Check out exhibits such as Surviving the Desert, as well as special features like Video Invaders that showcase vintage games and arcades. The museum is open Tuesday–Saturday from 10:00 a.m. – 5:00 p.m.

    Find other free activities at https://www.tempetourism.com/things-to-do/free-things-to-do/.

    Outdoorsy

    Tempe Town Lake

    Arizona may be a desert, but it doesn’t mean there aren’t plenty of places to splash around. The Tempe Town Lake is a great spot for kayaking, sailing, rowing, walking, jogging, fishing, or picnicking. Although some activities require rentals or permits, taking a stroll around the lake or hanging out with a picnic is free for all. If you do decide to rent a watercraft, make sure to check out the Dragon Boats!

    Tempe Lake

    Phoenix Zoo

    The Phoenix Zoo has a monkey village. Do you really need to know more? Bring your student ID for a discount to visit the sloths, elephants, Komodo dragons, and much more. Watch for special events during the holidays, like ZooLights, where you can drive through the Zoo filled with Christmas lights.

    Desert Botanical Garden

    See the beauty of the desert at the Desert Botanical Garden! Arizona has much more to see than just cacti—although they are diverse and beautiful. There are desert wildflowers, a butterfly pavilion, and mountain views, plus learn how the Sonoran Desert plants were used by native people for food, medicines and buildings. Advance tickets are required and must be purchased online.

    Big Surf Waterpark

    Although closed this season, Big Surf lives on and will reopen for the next season. And even though you can’t ride the wave right now, you can still rock out at a live show. Visit https://liveatbigsurf.com for concert acts and information!

    All the Hiking You Can Handle

    There are mountains in every direction in Tempe. From South Mountain to Camelback, Hayden Butte Preserve to Piestewa Peak, there are trail lengths and difficulty levels for all hikers. However, before you hit the trail, make sure you have the right gear for the hike, and that especially means plenty of WATER. Hiking is one of the best ways to see Arizona, but you need to do it safely. The Tempe Tourism office can help you plan ahead with details about the locations at https://www.tempetourism.com/things-to-do/hiking-and-biking/.  

    arizona mountain

    Indoorsy

    LegoLand

    Are you ever too old for Legos? No. The answer is no. Thank goodness there’s a LegoLand Discovery Center right here in Tempe. From a factory tour to a miniature replica of Arizona landmarks, LegoLand will make you feel like a kid again. (And you might have to ask your parents for money to spend at the Lego store.)

    SEA LIFE Arizona Aquarium

    Get out of the heat and under the sea with the 360-degree ocean tunnel at the SEA LIFE Aquarium. Jellyfish, sharks, seahorses—all of your favorite under-water creature live at the Aquarium, and if you’re making a big day of it, you can buy a combo ticket to LegoLand, too!

    Medieval Times in Scottsdale

    A massive turkey leg and a sword­—huzzah! If jousting, feasting, and majestic creatures are your jam, then Medieval Times is your ultimate destination. It’s a pricey excursion, but the four-course meal is included with the epic tournament. All hail the queen!

    Medieval Times

    Changing Hands Bookstores

    A popular local bookstore since 1974, Changing Hands Bookstore sells new and used books, but it doesn’t stop there. With locations in both Tempe and Phoenix, this bookstore hosts many fun events, such as an annual Harry Potter Birthday Party, where you’ll find Butter Beer, Polyjuice Potion, and more to go along with your reading adventure! Check out their full events calendar for meet-and-greets, virtual workshops, and book clubs: https://www.changinghands.com/event.

    Simply Smashing

    Have you ever wanted to Office Space a fax machine? OK, chances are, you’ve never used a fax machine, but it you do have some pent-up rage, Simply Smashing may be the place for you. Called “therapeutic destruction,” you can book a room, choose your weapon, and smash away! And although they do not offer discounts for students, they do add extra breakables for them!

    Arizona Day Tripping

    If want to get out of town, there are many options that you can visit for just a day, or maybe the whole weekend. Sedona, the Grand Canyon, and Havasupai Falls are all places that look like screensavers. In Jerome you just might find some ghosts, and Flagstaff and Payson will cool you off a minimum of 10 degrees. Check out Visit Arizona for more of the best places to explore.

    Sedona

    In addition to all these choices, Arizona provides a free show every evening—the gorgeous southwest sunset! So, pick what interests you, and get out to see what your new home has to offer. Welcome to Tempe!

    read more
    less

    Warning: Your iPhone has been Hacked


    Latest Apple Hack Leaves Users Open to Spyware You may have recently heard about the ...

    Latest Apple Hack Leaves Users Open to Spyware

    You may have recently heard about the extremely important update being pushed out to Apple iOS devices (iOS 14.8). You may have heard terms like zero click, Pegasus, or zero day. So how do you find out if you have been hacked or is it even detectable? There are some things you can do to protect yourself.

    A zero click vulnerability does what it says. It allows an attacker to force your system to install software without user interaction. This could be devastating if you rely on your phone like most people do. So how do you protect yourself?

    First, you should keep an eye on the performance of your device. Has it suddenly started running sluggish or slow? Takes a long time to initialize or shut down? Is your battery running down quicker than ever? This could be an indicator that the system is doing business in the background you need to be aware of. You should also monitor the top right hand corner of your Apple device. An orange dot means something is using the microphone on your phone and a green dot indicates something has accessed the camera and or microphone.

    Other indicators of compromise could include weird popups, pornographic content being displayed without your request, and new applications being installed that you did not install. Often times these odd applications will look like calculators, music apps, or even masquerade as other popular applications but will be capable of intercepting requests and causing you harm.

    spyware

    Technologically literate users could also connect their phone to a WiFi network and use a tool like wireshark on the network to monitor requests and connections. You can then filter that data and look for all URL and IP addresses connected to and then attempt to discover if there is inappropriate communication happening. This research requires a higher level of skill and technical acumen but would be the most accurate method of discovering if someone is exploiting your device.

    Students at the University of Advancing Technology are provided in depth training on tools like wireshark early on in their education and given the skills necessary to identify many types of harmful traffic. The technological adversary of today and tomorrow is skilled, motivated, and working hard to cause harm. It is our job to do all we can to protects others and ourselves from these kinds of threats.

    However, the vast majority of users do not need to panic about these types of attacks. Serious attacks are rare, targeted, and intended for high value targets related to oppressive governments and big businesses. Methods to protect yourself will depend on the attack used. Some malware is removed by simply hard restarting your device. Other malware is more insidious and can survive an imaging of the device by adding itself to your automatically downloaded applications. If you do discover someone has added something to your device, use iCloud to roll back the phone and then take time to change passwords on your accounts. If you’re still having issues, communicate concerns with the device manufacturer as well.

    UAT Security Operations Center

    read more
    less

    Descendant


    Descendant was created for UAT’s Storyboarding course. It follows the tale of two sides in a multi-generational war. The two sides, which are tense around each-other, end up battling due to a misinterpretation. ...

    Descendant was created for UAT’s Storyboarding course. It follows the tale of two sides in a multi-generational war. The two sides, which are tense around each-other, end up battling due to a misinterpretation.

    Descendant1-1

    On The Surface:

    A trio of Dragons (or Wyverns, more specifically) are relaxing in a forest. The trio is made up of a maternal, paternal and young figure—a mother, father and hatchling. When the hatchling wanders off, it is discovered by a Falconry bird, and is led back to its handler. Upon discovering the dangerous family living nearby, the handler warns the nearby city guard and in turn they bring it up the chain of command.

    The city's ruler decides to take up arms against the potential threats, due to their longstanding bad history with each other. At the end of the battle, the two adult dragons end up deceased, but not before the hatchling is safely hidden away. Even after searching, the third dragon isn't found, and it's been deemed dead due to lack of parental care.

    The hatchling hides away in his new home—the hollow magma chamber of an active volcano. There, he gains strength through the heat produced by the volcano and hibernates. After some time, the hatchling awakens, fully grown, and violently emerges from the volcano, causing an eruption. The Wyvern flies down to the city and burns it to the ground before leaving, content with his success. 

    Behind the Scenes Lore: (Unshared, needs to be revised)

    Matriarch - Mother Dragon (White)

    Patriarch - Father Dragon (Red)

    Anomaly - Hatchling/City Destroyer (Red, Later crimson / purple)

    The Sentient - Sentient Earth (Unshown in Animatic)

    In the script of the storyboard, the generational war began with a Sentient Earth, around the time period of what would be the Middle Ages. Understanding that one of her creations—being Mankind—was violent and had potential to ravage the planet, she created her own Champions. Equal in power to their enemy, the Wyverns descend upon harmful human civilizations to return them to ash from when the planet was new. The Wyvern's power would equal the human's, continuously evolving throughout the generations to maintain a balance. As such, the balance would not favor one side over the other, and each side was as likely to win or lose. The Sentient's main goal was to stunt the growth of humankind while she thought of a more permanent solution.

    The hatchling within the story is an anomaly—the first hatchling of any of the Wyvern pairs. The evolutionary traits were as intended, but when the hatchling was overcome by grief, he consumed additional power from the volcano—which is a direct line to Sentient Earth's Core (thus being so powerful in comparison).

    When The Anomaly awakens centuries later, the city has moderately evolved their methods of technology and defense, since there were critical flaws in their last design which were brought to light due to the Matriarch's assault. After she had hidden the hatchling on the volcano, she returned to find the Patriarch in a critical condition and went on a horrendous rampage of the city. She almost succeeded in her attempts at total annihilation.

    When awakened, The Anomaly erupts the volcano and immediately heads for the city. He destroys anything on his warpath to the main castle, before melting it into the ground. After a few more passes overhead, The Sentient calls him back to the volcano. Upon witnessing The Anomaly's ravaging of the city, she determined that he was currently generations beyond what their generational counterparts were evolved to handle. The Anomaly was set to hibernate in a now dormant volcano encased in thick, hardened lava rock until humankind has evolved to a state in which he is needed to return.

    Descendant2

    Working on the Animatic

    I've always been inspired by dragons and fantasy settings. For as long as I remember, dragons have been "my thing". I love how flexible they can be with their designs. It's nearly impossible to make a "wrong" dragon because you can base their attributes off of real-life animal traits. It allows me to draw what I love while also getting experience drawing aspects of real animals. I prefer fantasy settings because similarly with dragons, anything can happen. Anything is possible.

    For the storyboard, I used Clip Studio Paint Ex to draw my panels. I would sketch general poses, then add small details on top of that, followed by blocking in light and shadow. The final panels included a re-line of the sketch, color, adding light and shadow, and other small effects that showed up as I progressed. The final audio, panels and editing were done in DaVinci Resolve 17. The audio such as the growls, chirping and wing noises were found using Epidemic Sound, while a license Instrumental soundtrack of Jericho by Celldweller was purchased through FixtStore.

    The Future of Descendant

    The future is never set in stone. I have a few revisions of the story and narrative I wish to go through before getting ahead of myself and making a full-length feature. I've begun planning another possible Storyboard/Animatic for Descendant, although I won't disclose any details since it's still a few months before anything will be created. My overall goal for the future of this project would be an Animated Short Series. I feel as if the world could have a lot of life to it. Before I begin planning for such a heavy project, I'd have to get a conclusion for the story—since currently, it relies on an unbreakable cycle of violence. I created something that I've become fascinated with, and I hope to write something fantastic and evolve it further in the future.

    Descendant Animatic

    read more
    less

    Theory and Fact


    Many people wonder how a scientific theory becomes factual. How did Newton's experiment with apples come to be what we know about gravity? How observations about birds on the island of Galapagos become what we know about evolution? How did Einstein's musings on light, time, and space become what we know about general relativity? The answer is simple, but often not known outside the scientific...

    Many people wonder how a scientific theory becomes factual. How did Newton's experiment with apples come to be what we know about gravity? How observations about birds on the island of Galapagos become what we know about evolution? How did Einstein's musings on light, time, and space become what we know about general relativity? The answer is simple, but often not known outside the scientific community. Scientific Theories and Laws never become fact, according to science. 

    1,247 BEST Spacetime IMAGES, STOCK PHOTOS & VECTORS | Adobe Stock

    The definition of fact for a scientist is an indisputable observation of phenomena. It is a fact that you see an apple fall when you drop it (on Earth). It is a fact that the Sun is bright. However, it is not a fact that buoyancy causes boats to float. We know the scientific laws and theories of buoyancy, but that is because we have observed the fact that some objects float in water while others sink. Okay, so this business about facts being observations sounds like just an issue of semantics. How do we know when a theory is proven to be true? Answer: We don't.

    The goal of science is to find the most complete explanation for why and how things happen the way they do. Scientific theories explain the why things work the way they do: Gravity pulls things towards each other. And scientific laws describe how they do those things with math: 9.8 meters per second squared. The way we do this is by creating hypotheses, which are possible if-then statements describing interactions in the world. The scientific method provides us with a great set of steps that give us a great degree of certainty that any given experiment can be easily repeated and that its results are trustworthy. These results determine if a hypothesis we create is incorrect. However, an experiment can never prove that a hypothesis is true. 

    Let's say that you're a fisherman and have never seen the ocean before. You don't know if there are fish in this body of water like the other lakes and rivers you've fished before. So you hypothesize that if there are fish, then you will catch fish, but if there are not, then you won't. You go out all day and don't catch or see a single fish. So your hypothesis is correct! There are no fish. However, we know that the ocean does have fish. You have simply failed to prove your first hypothesis. If you went out again or for longer, you would see a fish, and then your second hypothesis would be rejected. 

    Physicists link 'quantum memories' in early step toward quantum internet |  Live Science

    In this way science is always changing, growing, and evolving with each new experiment and hypothesis that is disproved. The theories and laws that we accept today are simply a large collection of hypotheses that have not been disproved yet. Einstein's theory of general relativity works great most of the time, but it begins to fail when you look at individual atoms or subatomic particles. So what we accept as true in science will be true until proven false. 

    - Kody Mitchell

    keywords: science, theory, hypothesis, scientific law, scientific theory, scientific method, science falsification, evidence, proof, observation

    read more
    less

    Summer 2021 SIP Showcase 


    How do you earn tech respect? It's simple... you create new tech! For University of Advancing Technology (UAT) students, creating is not just a good idea, it's part of their curriculum and a requirement for graduation. Called a Student...

    How do you earn tech respect? It's simple... you create new tech!


    For University of Advancing Technology (UAT) students, creating is not just a good idea, it's part of their curriculum and a requirement for graduation. Called a Student Innovation Project, SIP projects are essentially like a state university’s equivalent of a thesis. Every major requires that a student develop their own innovation, and by the end of their degree program, that project is the main focus of their portfolio. 

    The Summer 2021 SIP Showcase was led by Dapzury Valenzuela, UAT's Art Direction Professor. "Our students continue to excel at conceptualizing ideas and bringing to life Minimal Viable Prototypes that provide fun, educational, and practical solutions to real-world problems," said Professor Valenzuela. "I'm so proud to help facilitate my students journey as their Lead SIP Instructor, along with our faculty who serve as Subject Matter Experts (SMEs) within their respective degree programs."

    Watch the full SIP Showcase!

    The following are all of the projects presented, with links to their individual briefs. 

    Juanita Madriz 

    Project Title: Real Estate Social 

    Project Description: Real Estate Social is an app that focuses on creating content for realtors to market properties, from beginners to creative agents. This project aims to assist anyone in the Real Estate business to design content using templates and graphic elements that help to promote and sell rentals and homes. 

    Degree Major: Digital Marketing & Advertising Art

    SIP URL: http://www.juanitamadriz.com/sip-project.html 

     

    Samantha Hernandez 

    Project Title: Oversimplified SpaceX 

    Project Description: Oversimplified Space X is an innovation video that uses understandable vocabulary to describe the Space X missions to regular individuals, as well as children, through an addition of a Nearpod quiz that checks their understanding of the material. 

    Degree Major: Business Technology & Network Security

    SIP URL: https://sammyhdz.weebly.com/sip.html 

     

    Kenna Draxton 

    Additional Members: Christopher Walters, Tyler Denton and Brittney Tollison 

    Project Title: Programme Facile 

    Project Description: Programme Facile is a web-based platform that facilitates the scheduling of Ballet Arizona members.

    SIP URL: https://dranun.wixsite.com/portfolio/sip 

     

    Samantha Jaros 

    Additional Member: Dawson Greeley 

    Project Title: Iris

    Project Description: Iris is a marketing ploy for businesses to use with smart home devices in an AI format. Iris takes a user's location and keywords to create a product placement that's developed for the user. Iris gives the user an option to not have a product placement as well. This helps a user from feeling overwhelmed with ads. 

    Degree Major: Digital Marketing

    SIP URL: https://samjaros.wixsite.com/samanthajaros/iris 

     

    Zinedin Bautista 

    Project Title: BuddyBot 

    Project Description: BuddyBot is a therapy chatbot that will check on the user's mental health. 

    The overall innovation of the project is to create an adaptive, flexible, multipurpose therapy mobile application. The mobile application will also motivate the user to participate in mental health exercises and to seek professional help. 

    Degree Major: Advancing Computer Science & Artificial Intelligence

    SIP URL: https://zingithub.github.io/Portfolio-Finale/ 

     

    Christopher Walters 

    Additional Members: Kenna Draxton, Tyler Denton and Brittney Tollison 

    Project Title: Programme Facile 

    Project Description: The Programme Facile team project focuses on creating a simple scheduling system for Ballet Arizona. This project aims at creating a better, more advanced system tailored to exact needs, that can be easily scaled to work with similar companies nationwide. My innovative contribution is a multi-language, web-accessibility feature with safety reminders. 

    Degree Major: Advancing Computer Science

    SIP URL: https://www.christophermpwalters.com/objective/sip 

     

    Katherine Lennon 

    Project Title: Apollo Desk 

    Project Description: Apollo Desk is a computerized touchscreen desk with a light display and integrated, easy-to-use applications. 

    Degree Major: Advancing Computer Science

    SIP URL: https://sites.google.com/view/apollodesk/home 

     

    Sandibell Vega 

    Project Title: DEAR SIBLING Chatbot 

    Project Description: DEAR SIBLING Chatbot is a bilingual application where children ages 6-12 can chat and interact with a chatbot sibling on an emotional level, allowing them to express themselves in a safe environment. 

    Degree Major: Robotics and Embedded Systems & Artificial Intelligence

    SIP URL: https://sandibellvega.weebly.com/sip-project.html 

     

    Darren Javes 

    Project Title: Kid’s Automatic Toothpaste Dispenser 

    Project Description:  This is a design to assist children who are learning to brush their teeth. It is an automatic toothpaste dispenser that will accept most common toothpaste tubes and dispense the proper amount of toothpaste on the toothbrush when it is put in the dispenser. 

    Degree Major: Digital Maker & Fabrication

    SIP URL: https://djaves3.wixsite.com/siproject

     

    Tre Payne 

    Project Title: Multipurpose Tripod 

    Project Description: This project is innovative because it takes a normal camera tripod to a full film/picture set. It will enhance use for better shots as well as save space. 

    Degree Major: Digital Video

    SIP URL: https://paynetre98.wixsite.com/trepayneportfolio/sip 

     

    Matt Graham and Joseph Arnoldo 

    Additional Members: Micah Turpin and Charles Skinner 

    Project Title: Next-Gen Enforcement 

    Project Description: This project innovates the traditional handcuff and integrates NFC locking and, in the future, a pulse reader and monitoring system. 

    Degree Major: Network Security 

    SIP URL: https://www.nextgenenforcement.com/ 

     

    Jared Broyhill 

    Project Title: Atlas System Hardener 

    Project Description: PowerShell-based, Windows 10 System Hardening Tool with a focus on accessibility. 

    Degree Major: Network Security & Artificial Intelligence

    SIP URL: https://jbportfolio1234.weebly.com/sip.html 

     

    Marcos Xochihua 

    Project Title: Educational PowerShell Assistance (E.P.A.) 

    Project Description: E.P.A. is designed to help teach Network Admins with PowerShell Automation scripts and start off their script collection. 

    Degree Major: Network Security

    SIP URL: https://sway.office.com/cQaJrGKEAIbElQkS?ref=Link 

     

    Codie Mitchell 

    Project Title: Little.Security.net 

    Project Description: This project is focused on baby IoT device safety by providing a “one-stop” information hub for parents looking for technical safety advice for their baby’s IoT devices, as well as ways to secure their network while these devices are on them. 

    Degree Major: Network Security

    SIP URL: https://www.codietower.net/ 

     

    Paul Gerke 

    Project Title: Eyes on the Network 

    Project Description: This project will introduce the first set of target information to capture and present it. The target information is new devices on the network. This can be useful to home and SOHO applications but will be particularly useful in private networks like industrial and closed areas. The device will capture broadcast traffic and compare the source address with a known list of addresses. If an address is not on the list, a notification will be generated, and data captured on the new device. The final goal of this project is to enable users to take predefined data points and use them to build automated tasks. With this, someone could automate an approval process for adding new devices to a white list, or simply generate a device inventory. 

    Degree Major: Network Security

    SIP URL: https://www.paulgurke.com/ 

     

    Marissa Williams 

    Additional Member: Elijah Nutter 

    Project Title: Draw: The Game 

    Project Description: DRAW: The Game is a new mechanic that allows the player to draw a 2D mesh that is converted to a 3D object, have the object drop into the scene, and then lets the player pick up that object and use it to interact with the scene. 

    Degree Major: Game Art & Animation

    SIP URL: https://mariiwill18.wixsite.com/mysite-1/objectives 

     

    Ross Hall 

    Project Title: Candy Menu 

    Project Description: A debug menu that can be used by any game written in C#, regardless of game engine or framework. 

    Degree Major: Game Programming

    SIP URL: https://roshall.wixsite.com/candy-menu 

     

    Daniel Silva

    Project Title: Art of Reading

    Project Description: Art of Reading is a fun and interactive platform that will compel children to learn how to read and improve on spelling. Using Augmented Reality and Artificial Intelligence, Art of Reading will analyze words or physical objects, through computer vision, and then present interactive learning puzzles, based on those objects, back to the user. 

    Degree Major: Game Programming

    SIP URL: https://dtsprogramming.com/sip-brief 

     

    Malik Shaw 

    Project Title: Feeling Empathetic 

    Project Description: This project is to form a method or guideline which people can use to get their players to express empathy without forty hours of gameplay and story build-up. 

    Degree Major: Game Design

    SIP URL: https://maliks9885.wixsite.com/mysite 

     

    Rhiannon Holloway 

    Project Title: Ballista Frenzy Game Mechanic 

    Project Description: Ballista Frenzy seeks to demo the idea that travel mechanics can be linked to other mechanics in order to create more interesting gameplay. It also seeks to aid the development of cartoony physics in games. 

    Degree Major: Game Design

    SIP URL: https://rhiannonholloway.wixsite.com/sipballista 

     

    And now—insert drumroll in your brain here—the SIP Winners for this semester are...

    Best SIP Pitch 🏆

    Real Estate Social by Juanita Madriz

    real estate social project

    Most Market Viable 🏆

    Dear Sibling Chatbot by Sandibell Vega

    dear sibling chatbot

    Viewers' Choice 🏆

    Art of Reading by Daniel Silva

    art of reading

    World Changer 🏆

    Atlas System Hardener by Jared Broyhill

    atlas system hardener

    Ingenuity Prize 🏆

    Draw the Game by Marissa Williams

    draw the game

    Best in Show 🏆

    Programme Facile by Kenna Draxton and Christopher Walters

    programme facile

     

    Congratulations to all of the participating students. Keep up the excellent work, and most importantly, don't stop creating!

    read more
    less

    Aiming for 50 Percent


    When the “It was never a dress” image first appeared, I was thrilled. I found it so inspiring. But after some further thought I realized, it’s truly alright if it actually was a dress… or a superhero costume, pants, tights, or whatever. The important thing is that we all get the opportunity to choose to be what...

    When the “It was never a dress” image first appeared, I was thrilled. I found it so inspiring. But after some further thought I realized, it’s truly alright if it actually was a dress… or a superhero costume, pants, tights, or whatever. The important thing is that we all get the opportunity to choose to be what we want to be, and that applies to women in technology.

     


    It’s no secret that technology jobs have largely been a boy’s club in a man’s world, but at UAT we don’t accept that it must remain that way. When it comes to women in technology, our goal is a substantial one—until 50 percent—which means we won’t stop working until we provide equal opportunity for women in the field.

     


    According to the WomenTech Network, it would take more than 73,000 days to close the economic gender gap and today’s pace.

     

    It won’t be fast, and it won’t be easy, and if we’re being honest… we still have a long way to go. Our incoming fall class of students is currently 20% female, and while that’s a long way to 50%, we’re proud to be filling in the gap. That number is slightly above average, as ComputerScience.org reports that women hold only about 18% of undergraduate computer science degrees.

    But although the balance starts with educational opportunities, it ultimately ends up in the hands of the industry. According to Jamie Green of the Forbes Human Resources Council, “…the five most powerful technology companies in the world (Amazon, Apple, Facebook, Google and Microsoft) average a workforce of only 34.4% women.” She attributes this to “the broken rung,” describing the disproportionate number of women advancing to manager-level positions. Read more about this in the Women In the Workplace study at https://wiw-report.s3.amazonaws.com/Women_in_the_Workplace_2019.pdf. Globally, women hold less than 20% of all leadership positions in technology, according to Finances Online.  

    And while it would be easy to focus on the negative statistics, we’re instead choosing to look to the future. On campus at UAT, that looks like a lot of things. Our female students are leaders, gamers, and coders who are tackling STEM education and preparing to be tomorrow’s leaders. According to the TechJury blog, the next 5–10 years should see women in technology positions rise to 40% on a global scale, and we fully expect our students to be part of that.

    So what can you do? Encourage a healthy interest in STEM fields for all. Be a mentor, and provide opportunities where they lack. Anything worth doing takes effort, and if we really try, we can make the tech space a place where women feel welcome—in a dress, or a cape, or whatever…

    women in tech

    read more
    less

    Protecting Kids from Online Predators


    Cyber students at UAT quickly learn the importance of ethics in the world of online security. The possibilities of what they can do online is both exciting and scary, as they learn about the misuse of the internet by predators.  Students Monte Gualtiere and Emilio Cress are Network Security majors who recognize the severity of predatory behavior...

    Cyber students at UAT quickly learn the importance of ethics in the world of online security. The possibilities of what they can do online is both exciting and scary, as they learn about the misuse of the internet by predators. 

    Students Monte Gualtiere and Emilio Cress are Network Security majors who recognize the severity of predatory behavior that targets children. They put together the following thoughts and tips concerning online safety for children. 

    Protecting Kids from Online Predators

    Children go missing every day, with the FBI reporting in the USA around 460,000 children go missing yearly. The internet has made it possible for criminals from countries all over the world to gain access to kids, and abuse is rampant on social media and in online games.

    Yet keeping children safe from predators online has been a major concern for parents since the internet has appeared in homes. Alicia Kozakiewicz was the first victim of an internet-based child abduction. She was kidnapped by a 38-year-old man who pretended to be a 13-year-old boy, and she was lured from her home near Pittsburgh. This event happened in 2002 but many of the lessons are still useful today because protecting our children from online predators is vital. Enforcement of rules, limiting engagement, and being aware of the dangers can tremendously benefit the children and make the online world a safer place.

    One of the methods by which a parent can protect their child is to limit screen time. By limiting screen time, parents can reduce the footprint that an attacker or abuser can use to take advantage of the child. Children who are unsupervised when using devices are easier prey when compared to those who have some level of supervision and structure to their device usage.

    Another of the biggest internet safety problems facing children is the number of applications they have access to. Social media is one of the main ways predators can get access to victims without parents ever being aware. Fortunately, every device and the applications that functions on it likely comes with parental controls which can help limit the potential threat of a child encountering a predator.

    And there are more ways to get help.

    Schools and other venues offer help that can be utilized, often hosting seminars or rallies
    where guest speakers come and do talks on topics such as drug abuse or cyber bullying.

    Last year, the U.S. Attorney’s Office offered recommendations for parents to become extra vigilant as COVID-19 drove children online even more:

    1. Discuss Internet safety with children of all ages that are online. Many children do not realize that people may not be who they claim to be online. Similarly, many do not understand that someone who seems like a friend online could have a deviant motive.
    2. Set limits around who your children are allowed to communicate with. You may consider limiting young children to communicating only with people you have personally met. For older children, you may consider limiting them to communicating only with people they have met in person.
    3. Set limits around the kinds of devices and applications your children use. Online child sexual predators often use new technologies to avoid detection by law enforcement. If your child is using an application you have not heard of before, consider researching the application online or testing it out using your child’s account.
    4. Use technology to protect them. Many devices and programs allow parents to set parameters around which applications children may use and for how long. Similarly, many of these programs allow parents to see what their children are doing while using those applications.
    5. Pay attention to warning signs. Children who are sexually exploited are often embarrassed and hesitate to tell parents or other authority figures about their experiences. Pay attention if your child is withdrawing or changing their mood while their Internet activity increases.
    6. Report suspected abuse. Reporting can help minimize or stop further victimization. If you believe your child has been sexually exploited online, contact the United States Attorney’s Office, your local F.B.I. office, or report online at www.cybertipline.org.

    Find additional tips at https://www.end-violence.org/safeonlinecovid.

    Children rarely listen to their parents, that is no secret, but if we had multiple voices and ways to spread awareness in a holistic and family first format, we could combat these issues with greater effectiveness. The fight for children to have the right to just be kids again doesn't seem so steep a climb when we work together.

    child playing video game


    More about the authors:

    Monte Gualtiere is a student at the University of Advancing Technology and majoring in Computer Security. He has a passion for protecting others though computer safety. He loves to participate in different activities on campus, work on his car, and one of his favorite video games is Rocket League. 

    MonteG-2-1

    Emilio Cress is a student at the University of Advancing Technology and is majoring in Network Security and Network Engineering. He has a passion for computers and protecting others. He can often be found at his desk tinkering with his computer or playing video games. He is a hardworking, straight A student, a well-known community theater performer, and he loves to spend time with his friends and family.

    Emilo_Cress-1


    Leading cyber security education in the southwest, University of Advancing Technology (UAT) has surpassed 20 successful years since the inception of its elite Network Security degree program. As one of the longest-running cyber security degrees in the southwest, our complete continuum of undergraduate and graduate cyber security degrees have prepared thousands of ethical hacking, network security, and cyber security graduates. The NSA has designated UAT as a CAE training center in cyber defense.

    Our prestigious cyber security degrees include the undergraduate Network Security, Network Engineering, and Technology Forensics, and the elite graduate degree in Information Assurance transporting graduates to the leading edge of industry.

    Cyber Security Passion

    read more
    less

    Financial Aid Resources: All About Scholarships


    In addition to financial aid, scholarships are an excellent way for incoming UAT students to fund or partially fund their education. UAT offers various scholarships, and you will...
    In addition to financial aid, scholarships are an excellent way for incoming UAT students to fund or partially fund their education.

    UAT offers various scholarships, and you will learn if you qualify for any upon acceptance. (If you have yet to apply to UAT, do that soon!) 

    Along with potential scholarships awarded by UAT, there are many other scholarship opportunities available to you from external sources. 

    According to Savings For College, each year, more than 1.7 million private scholarships with a total value of more than $7.4 billion are awarded. It is also reported that several scholarships go unawarded due to either no applicants or no qualifying applicants.

    UAT is here to help you find scholarships so that you don't leave any opportunities for free money on the table.

    Types of Scholarships

    There are various types of private scholarships awarded for all sorts of different requirements, including, but not limited to:

    • Academic scholarships
    • Athletic scholarships
    • Community service scholarships
    • Scholarships for hobbies or extracurricular activities
    • Identity scholarships 
    • Need-based scholarships
    • Employer scholarships
    • Military scholarships

    student working on a project

    How To Start Your Scholarship Search

    Step 1: Begin Early

     

    High school students can generally begin applying for scholarships as early as their junior year, but it's never too early to begin research to get ahead of the game. That being said, it's also never too late to start applying. Better late than never!

    Step 2: Create a Goal

    Work within a specified time frame to set a specific and attainable goal when applying for scholarships (ex. 3 scholarships a week). You want to hold yourself accountable, but don't put so much pressure on yourself that you start avoiding it.

    "Apply for as many as possible and keep in mind that the search doesn't stop once classes begin. Funding your degree entirely with scholarships is going to be a full-time job," says Brittany Belscher, UAT Financial Aid Administrator.

    Step 3: Track Everything

    Create a scholarship tracking spreadsheet to keep all activities, deadlines, submission requirements, and other details organized. Also, save everything you submit. This may come in handy later when you have to answer the same questions on another application. 

    Don't forget to create scholarship submission openings and deadline reminders on your calendars as well!

    Step 4: Be Realistic, But Don't Rule the Achievable Out

    UAT recommends that you start by finding scholarships that you would already be eligible for based on requirements, first—think, low-hanging fruit. Save the links to these applications, figure out what you need to do for them, and start preparing your submissions and attachments. 

    However, know that scholarships that are easy to qualify for are also likely to have a high volume of applicants. To enhance your potential for more scholarships, start looking for ones that have requirements you can realistically take on before the application deadline. For example, activities like a community service project, an extra class you could take or group you could join, or a leadership effort.  

    Where To Find Scholarships

    Many non-profit and private organizations offer scholarships, and you can find several others from checking on general scholarship resources, including: 

    One of UAT's favorite resources for incoming freshmen is the scholarships.com resource listing of scholarships awarded to high school students

    If you're an active UAT student, you may qualify for a UAT Foundation Scholarship.

    How To Research for Scholarships

    You can look beyond the general resources as there are likely thousands that aren't listed there. Visit your favorite search engine and type in “scholarships” and “_________”. Fill in the blank with information about yourself including, but not limited, to:

    • Ethnic background
    • Religious affiliation
    • Hobbies, interests, skills
    • Major/Technology
    • Unique characteristics, needs, or family-related attributes

    You can also search for scholarships with companies of brand names of items in or around your home, local businesses, community centers (i.e. Kiwanis Club, Elks Club, Rotary Club), and churches or similar affiliations. 

    Where Else To Find Scholarships

    Here are more external scholarships you may not find on general scholarship search engines that UAT students, depending on various requirements, have specifically been invited to apply for:

    Additional Resources

    Check out our Financial Aid Resources or Tuition pages to get more information. Want to talk to someone? Schedule a private meeting with a Financial Aid Administrator. You can also register for our upcoming UAT Financial Aid Workshop events through our Eventbrite.

    And, if you haven't, apply to UAT today! 

    Apply Now at UAT

    read more
    less

    Financial Aid Resources: FAFSA Myth vs. Fact


    While supporting incoming and current students through the financial aid process including determining their eligibility for federal student aid, our Financial Aid team occasionally encounters misconceptions that can often lead to setbacks within a student's enrollment process. ...

    While supporting incoming and current students through the financial aid process including determining their eligibility for federal student aid, our Financial Aid team occasionally encounters misconceptions that can often lead to setbacks within a student's enrollment process.

    UAT is here to provide you with resources to get through your Free Application for Federal Student Aid (FAFSA) application successfully, create a financial aid plan, identify funding options and more. But first, let's advance you forward by busting some common FAFSA myths so you don't get held up. 

    Common FAFSA Myths

    Myth: Filling out the FAFSA is challenging and takes a really long time to complete.

    Fact: If you're prepared with all the necessary information you will need ahead of time, the application should be easy and only take around 30 minutes to complete. 

     

    Myth: If I'm under 24 years old, a dependent or married, the parent or spouse required to provide their information on my FAFSA will be tied to and liable for my student loans. 

    Fact: This is not true. The FAFSA is a free application to determine federal student aid eligibility only and does not bind anyone to any financial lending or loan contract. 

     

    Myth: I won't receive eligibility for financial aid if my or my parent's income is too high, so I don't need to fill out the FAFSA. 

    Fact: While income is one determining factor, you shouldn't skip on the FAFSA for that reason alone. The only way to know for sure is by filing your FAFSA. 

     

    Myth: My parents and/or I need to file taxes for the current year before I can submit my FAFSA.

    Fact: The FAFSA requires tax information from two years prior, so there is no need to delay if you haven't filed taxes for the current or previous year yet. 

     

    Myth: If I receive a FAFSA verification request, something is wrong with my application. 

    Fact: If you receive a FAFSA verification, do not worry as verifications are sometimes chosen at random. If you are having trouble completing your verification request, reach out to your UAT advisor for help! 

    Get Started on the FAFSA

    Filling out the FAFSA is easier than ever. With a user-friendly online application or mobile app, you can have yours completed and processed quickly to understand what funds are available to you. Start your application now

    Don't forget to use UAT's School Code: 017188 to have your information sent back to UAT.

    Financial Aid Resources

    Check out our Financial Aid Resources or Tuition pages to answer additional questions you might have. For official FAFSA information, find it all here.

    Want to talk to someone? Schedule a private meeting with a Financial Aid Administrator

    Register for our upcoming UAT Financial Aid Workshop events through our Eventbrite.

    And, if you haven't, apply to UAT today! 

    read more
    less

    What's Trending in the Security Industry Association (SIA)


    SIA and Safe Cyber Hygiene 2021 is only halfway over, and the cyber community is seeing an ever-growing number of attacks on infrastructure and the cyber landscape at large. Some of the largest attacks so far have been through supply chain attacks, or methods by which individuals can attack a company by...

    SIA and Safe Cyber Hygiene

    2021 is only halfway over, and the cyber community is seeing an ever-growing number of attacks on infrastructure and the cyber landscape at large. Some of the largest attacks so far have been through supply chain attacks, or methods by which individuals can attack a company by intercepting devices or data between the supplier and the consumer. We saw this with SolarWinds, as an attacker successfully broke into the SolarWinds code repository and made changes that were pushed out to their customers, facilitating an attack.

    We are also in the midst of increasing tension and hostilities between governments. Foreign adversaries have been executing more flagrant and obviously hostile attacks against industry and infrastructure that is presenting an opportunity for escalation. Some members of the government have questioned whether we can or should be providing a kinetic or violent response to some of these attacks due to their devastating effect on the American people.

    We can protect ourselves from some of these threats by continuing to practice safe cyber hygiene. It's pretty simple: Don't click strange links, keep your computer up-to-date, and avoid opening unsolicited attachments.

    While we cannot defend against all attacks, we can certainly modify our behavior to reduce the threat footprint that we generate.


    Check out the SolarWinds attack timeline:

    GAO SolarWinds Infographic April 2021

    More about UAT’s Cyber Programs

    Our cyber security degree majors and cyber security lab are recognized by industry and government entities alike for their ability to help generate the future innovators of the cyber security industry. We focus on creating true leaders who will have mastery in ethical hacking and uphold the highest industry standard of cyber integrity in our quickly evolving world of cyber security technology and online security.

    Visit the University of Advancing Technology for more information on all our cyber security majors. 

    Ready to start? Apply now at uatfastapp.com.

    Cyber Security Cave at UAT

    read more
    less

    Stand Against Cyber Bullies


    Cyber Bullying Is Serious Online harassment, sometimes known as cyber bullying, can take many shapes, but is still a serious threat to the well-being of others. Sometimes people dismiss or perceive cyber bullying as a non-issue, but hostile behavior online has caused serious harm­—including...

    Cyber Bullying Is Serious

    Online harassment, sometimes known as cyber bullying, can take many shapes, but is still a serious threat to the well-being of others. Sometimes people dismiss or perceive cyber bullying as a non-issue, but hostile behavior online has caused serious harm­—including suicide—in individuals.

    Cyber bullying can happen on social media, over devices like cell phones, over email, or through online gaming platforms. Anywhere that a person can convey a message, they could potentially use that venue to send hateful, hurtful, or harmful messages. The ubiquity of devices and tools that can be used has led to a near permanent potential to receive messages that may cause distress.

    A famous example of a cyber bullying incident is that of Megan Meier. Megan committed suicide by hanging herself after it was discovered that a grown woman who knew Megan had pretended to be a boy and lured her into an online relationship—which she then used to humiliate her. Megan was devastated by this behavior and chose to take her own life.

    It is important to understand that online harassment can have very strong ramifications in the outside world, and if you or someone you know are being bullied, you should seek assistance. You can communicate with a school counselor or law enforcement, and specifically at UAT, speak with Student Services if you are dealing with any kind of cyber bullying.

    Don't suffer alone, and in the same frame of thinking, practice kindness online. 

    stop cyber bullying

    Interested in cyber security?

    UAT offers a variety of degree choices, from associate to master degree options. Review the programs available at https://www.uat.edu/cyber-security-degrees, and contact admissions@uat.edu to get started!

    read more
    less

    Touching the Sky: Getting Hands on with Astronomy


    UAT Students Visit the Meteor Crater in Northern Arizona The University of Advancing Technology (UAT) general education science department has a variety of Earth, Environmental, and Astronomical courses available for students to...

    UAT Students Visit the Meteor Crater in Northern Arizona

    The University of Advancing Technology (UAT) general education science department has a variety of Earth, Environmental, and Astronomical courses available for students to pursue. UAT has two entry level Astronomy courses. Astronomy-101 The Night Sky is an introduction to the field of astronomy for the non-science major. Topics covered include the scientific method, the stars, telescopes, the night sky and constellations, and the moon system; the course ends with looking at the size and scale of the universe. AST-301 is a more advanced astronomy course, looking at the formation of the solar system and the planetary geology of the worlds among us.

    In both astronomy courses, students are privileged to experience engaging, hands-on activities in addition to their course lectures. Each course is also provided with the opportunity to visit and study local astronomical and geological attractions. This year, the Astronomy-301 course took full advantage of the prospect of visiting Meteor Crater (also known as Barringer Crater) to evaluate the worlds most preserved impact crater. As part of the ‘History and Geology of Impacts of the Solar System’ unit, the Astronomy-301 course spent an afternoon exploring and assessing this historic site, located about 30 miles East of Flagstaff, Arizona. The students used their knowledge of geology and impact collisions to appraise the site, all the while continuing to discover new and interesting facts about impact craters.

    Meteor Crater Visitor Center is one of the most popular attractions in Northern Arizona

    If you would like to learn more about UAT’s Astronomy programs or are interested in other scientific fields pertaining to Earth or Environmental Science, please do not hesitate to reach out to our prestigious faculty or Student Services Department to enroll in a course. Call (602) 383-8228 or email admissions@uat.edu to apply, enroll, or simply ask questions about our courses. 

    Students visiting the Meteor Crater and Space Museum.

    Meteor Crater Visitor Center

    read more
    less

    5 Tips for College Freshmen to Make the Most of Your First Year


    How can college freshmen make the most of their first year of college? Embrace the newness.  Millions of college freshmen will begin classes this fall, and for this freshman class, it...

    How can college freshmen make the most of their first year of college?

    Embrace the newness. 

    Millions of college freshmen will begin classes this fall, and for this freshman class, it sparks a lot of newness. Will my classes be virtual or in-person? How do I make the most out of my year? Where do I turn for financial questions? Some seemingly common knowledge questions just aren’t that common, considering most high school seniors have spent almost a year in a remote/hybrid learning environment.

    Here are a few tips for incoming college freshmen to help aide in a successful transition to college:

    Ask questions: You are not a bother and your questions—no matter how big or small—are important. Never assume; when in doubt about class times, assignments, or even where a building is, ask your advisor.

    Make the most out of your year by getting involved: Social interaction has been somewhat limited over the past year, but collegiate clubs and activities are a mainstay. Get involved, join a club, go to a club fair. You’ll find like-minded students that can foster into friend groups.

    Focus on looking ahead: The first two weeks of college typically focus on setting the stage for the semester. Peek ahead. Each course will have a syllabus, so use that as a tool to see when you will be most busy during the semester. Knowing when tests, quizzes, and assignment are due for each class will help you game plan how much time you need to expend preparing for each course.

    Avoid procrastination: University classes are different than having a full day of school. Typically, you will have pockets of class times. You will have a lot more extra time on your hands—but use it wisely. Getting a planner or calendar to assist you in managing your time is key to avoiding procrastination. 

    Meet you Financial Advisor: Even if you have everything aligned, establishing rapport with your financial advisor is key. They may be able to point you in the direction of scholarships and opportunities that students have used in the past. Building a good relationship with finance will only help you stay in the loop so you can focus more on your coursework and less on the financial details.

    Remember, it’s OK: There are going to be times when you make mistakes. Use the opportunity to learn from them and not repeat. If you’re late for a morning class, set your alarm earlier. Then, next term, try to schedule afternoon classes to help yourself out. 

    Going to university is an achievement in itself. You will meet new friends, learn new topics, and have an entirely different schedule. Embrace it. Freshman year is going to be one of the most exciting times of your life.

    The bottom line? College is amazing, and even though it takes a great deal of effort, it's worth it. 


    Ready to get started? Don't wait!

    {{cta('a726a6aa-84b9-4d0f-8231-6bfda4f1a116')}}

    The campus of University of Advancing Technology.

    read more
    less

    Fraud Defense in E-Commerce


    Understanding E-Commerce Fraud is Vital E-Commerce generates nearly $5 trillion dollars in sales and is here to stay. The greatest danger to any e-commerce site is going to be fraud. Companies loose nearly $12 billion dollars per year in fraud and the danger will only continue to grow as more retailers are moving to a majority online presence. Understanding fraud...

    Understanding E-Commerce Fraud is Vital

    E-Commerce generates nearly $5 trillion dollars in sales and is here to stay. The greatest danger to any e-commerce site is going to be fraud. Companies loose nearly $12 billion dollars per year in fraud and the danger will only continue to grow as more retailers are moving to a majority online presence. Understanding fraud and the dangers presented is vital to any e-commerce business. 

    The number one method of committing online fraud is through the use of stolen credit card data. The information needed to commit this kind of fraud is sold over the web in bulk and then the bad guys will make purchases online using a network of "mules", or individuals hired to process the stolen goods. We often see this during the holiday when unwitting victims are hired in bulk to "wrap gifts" that have been purchased on sites like Amazon and then forward them on to other individuals. This forces investigators to focus on the individuals "hired" who work as a smoke screen to reduce the chance that the goods can be interdicted or recovered.

    Retailers can deploy tools like fraud detection solutions that help identify and flag suspicious transactions, or they can rely on the fraud prevention tools provided by their credit card processing company. In addition, it is important that retailers do their part by maintaining their Payment Card Industry Data Security Standards and do their best to protect their customers’ data.

    As mentioned, holidays are often the best time for the bad guys to operate as people are desperate for extra money, and it is easy to victimize people as well as companies. Pay attention to odd orders and strange instructions. Odd behavior can indicate a bad actor.

    Defending your company can be time consuming and expensive, but by paying attention to orders, taking advantage of anti-fraud tools provided by your processing company, and staying vigilant, you can help put a dent in the $12 billion dollar fraud industry.

    e-commerce and online shopping

    SECURE YOUR FUTURE WITH A CYBER SECURITY DEGREE

    Network Security degree students will use critical thinking to research current and evolving cyber security trends and become experts in network security industry standards and regulations. Graduates from the cyber security program will have the essential knowledge and experience to automate their own security processes through extensive training in network security programs and scripts, and be prepared for careers in government and multinational corporations seeking certified ethical hacking professionals.

    Don't wait. Apply now!

    read more
    less

    What is a Robotics and Embedded Systems Degree?


    Robotics and Embedded Systems Education Robots may not be taking over the...

    Robotics and Embedded Systems Education

    Robots may not be taking over the world (yet), but the field of robotics does present an exciting opportunity to learn more about robots, AI and their application to our human world.

    As a technology-heavy degree, Robotics and Embedded Systems focuses on how robots work, how to build them and how to use them to improve our everyday lives. And the projected salary for Robotics majors isn’t bad either!

    In this guide, we are covering what Robotics and Embedded Systems is, why a degree might be worth it and how to get started in the field of Robotics.

    What are "Robotics and Embedded Systems"?

    A Robotics and Embedded Systems degree prepares students to work with systems that combine hardware and software to perform functions or tasks. “Robots” are mainly mechanical devices and hardware, whereas “embedded systems” usually serve a specific functionality and are embedded into an existing device.

    Robots and embedded systems often work together as well as independently. In either case, highly skilled professionals are needed to make these devices and systems work effectively.

    Is Robotics a Good Career?

    According to a study conducted by RoboticsTomorrow.com, robotics engineers are not only highly compensated, but they are also some of the happiest professionals in the STEM fields. When surveyed, robotics engineers rated their field an average of 4.2 out of 5, which puts them in the top 4% of all careers!

    There are a few reasons why robotics is a great career:

    • High salary
    • Great utilization of skills
    • High work satisfaction
    • Vast job prospects
    • 9% job growth (2016-2026)
    What Jobs Can You Get with a Robotics Degree?

    There are a wide variety of jobs you can get with a robotics degree or STEM degree with a robotics focus. Your opportunities are not limited to full-time employment, either; many robotics engineers go on to work for themselves as freelance researchers or inventors.

    Top 5 Robotics Careers:
    1. Mechanical Engineer – Average Salary: $90,160 per year
    2. Software Engineer – Average Salary: $110,140 per year
    3. Computer Hardware Engineer – Average Salary: $119,560 per year 
    4. User Experience (UX) Designer - Average Salary: $85,490 per year
    5. Data Scientist – Average Salary: $103,930 per year
    Job Marketing For Robotics Engineers

    The demand for robotics engineers is growing – and it pays well! 

    According to Sokanu, the job market is expected to increase by 6.4 percent between 2016 and 2026. 

    Plus, over the next 10 years, the United States will need over 12,500 new roboticists in the field.

    “The demand for automation and robotics will continue to fuel these high paying jobs, and we expect this to continue for the next 20 years.” Dr. Jill Coddington, Program Champion of Robotics & Embedded Systems

    University of Advancing Technology Bachelor's of Robotics and Embedded Systems

    Robotics-Related Degrees in STEM

    While a degree in Robotics and Embedded Systems is certainly interesting and worthwhile, it’s important to know that there are related degrees one can pursue if they are interested in creation and simulation technology. At University of Advancing Technology (UAT), we offer several degrees for those looking to learn more about robotics, digital maker and fabrication, human computer interaction (HCI) and virtual reality.

    Digital Maker and Fabrication

    A Digital Maker and Fabrication degree prepares students to design, build and apply new technological devices. It combines user-centric design theory with a variety of skills, including programming, parametric modeling, kinematics, 3D manufacturing and more.

    Human Computer Interaction

    The Human Computer Interaction Degree involves the real world application of computer technologies, intelligent interfaces, virtual and augmented reality and new I/O devices. Students in this program develop use cases for software and devices, create virtual environments and develop integrated digital assets.

    Virtual Reality

    A Virtual Reality Degree applies the design principles of gaming to real-life applications. This may include use cases for corporate training, medical and therapy, military and education and more. Students are exposed to all the tools of the games profession and will develop programming and asset creation skill sets.

    How to Become a Robotics Engineer

    Becoming a roboticist follows a similar path as most other STEM fields: application, education, experience and job searching. 

    Here is the general process for how to become a robotics engineer:

    Step 1 - Apply to a robotics program

    Search for a reliable and accredited robotics program to learn the fundamentals of robotics engineering. 

    A holistic, thorough education is your best bet for obtaining the skills you need to become a marketable robots expert. You can apply for a program during high school, after undergrad, or at any stage of your life.

    Step 2 - Graduate from robotics program

    Once you’ve completed your degree, you should have a thorough understanding of how robots work, how to design devices, how to create systems and how to apply them to real-world scenarios. The fundamentals will get you far, but honing your skills and gaining hands-on experience will take you to that next level.

    Step 3 - Obtain hands-on experience

    UAT offers a variety of apprenticeship and internship opportunities to help students gain hands-on experience. This is where you can apply what you’ve learned.

    Step 4 - Apply for robotics jobs

    There are a wealth of job opportunities for robotics majors. 

    To help in your search, most colleges and universities provide career counseling, host job fairs and have job boards that list job openings. 

    Some other places to look for robotics jobs include:

        • Google
        • Indeed
        • LinkedIn
        • Local career fairs
        • ZipRecruiter
        • Glassdoor
    Get a Robotics and Embedded Systems Degree at UAT

    UAT offers a complete Robotics and Embedded Systems degree to prepare students to enter the field of robotics. Students will learn to use robotics technology, design digital hardware, learn software programming and more.

    Our students will have the ability to build, develop, implement and analyze advanced robotics technologies. This prepares them for a successful career in the electronic and robotics industry.

    Learn more about our programs and apply today to get started!

    Robotics Student at University of Advancing Technology

    read more
    less

    Why Get A Game Design Degree? Find Out Why and How to Get a Gaming Degree.


    Why Get A Game Design Degree? If you often find yourself daydreaming about fantasy worlds, diving into the digital depths of mystical lands, or engineering complex landscapes in your favorite games, then game design may be the career for you. Video Game Design and Animation allows you to explore a...

    Why Get A Game Design Degree?

    If you often find yourself daydreaming about fantasy worlds, diving into the digital depths of mystical lands, or engineering complex landscapes in your favorite games, then game design may be the career for you.

    Video Game Design and Animation allows you to explore a limitless world of possibilities – both in terms of career potential and in exploring what’s possible in today’s digital frontier. You are able to explore your own creative potential and cultivate a lucrative, fulfilling career. At University of Advancing Technology (UAT), we open the door to gaming and design aficionados alike.

    What is Game Design and Animation?

    Video game design exists within the realm of computer animation, but focuses primarily on game design and creative interactive worlds, characters, and features. Game designers combine creativity, art, technology and computer science to design unique environments and games for people to enjoy. 

    Animation uses art and technology to create moving figures and images. Traditionally, these images were drawn or painted by hand, but today, most animators use computer animation – i.e. CGI technology.

    Is Game Design a Good Career?

    Game design is one of the most rewarding careers out there. While it can be challenging, the career outlook for game designers is looking good, with the job market expected to grow by 8% between 2016 and 2026.

    Why is game design such a good career? Well, the gaming industry as a whole has seen massive growth with no signs of slowing down. In fact, the games market is expected to hit $200 billion by 2024.

    There are a few more reasons why gaming is a great career:

    • Great creative outlet
    • High work satisfaction
    • Full-time and freelance potential
    • Vast job prospects

    What Jobs Can You Get with a Gaming Degree?

    When most people imagine a “gaming career”, they likely picture someone sitting at their computer or TV playing games all day. And while you CAN get paid to do this, a Gaming Degree is far more applicable to game design, development, testing and production.

    Top 5 Gaming Careers:

    1. Games Designer – Average Salary: $66,282 per year
    2. Software Developer and Game Programmer – Average Salary: $72,000 per year
    3. Special Effects Animator – Average Salary: $77,700 per year
    4. Games Artist – Average Salary: $60,213 per year
    5. Game Play Tester – Average Salary: $53,030 per year

    UAT for Game Studies

    UAT is known for innovation and we encourage our students to explore all areas of interest in Science, Technology, Engineering and Mathematics (STEM). Our games studies degrees empower students to learn more about video game design, animation, game development and testing and much more. In fact, UAT’s Synchronic Learning Model promotes cross-collaboration across all other UAT game studies degrees, including Game Design, Game Programming, Virtual Reality and Game Production and Management.

    UAT is an intimate, fully accredited University that focuses on educating students in advancing technology. Our goal is to encourage students to innovate, develop new ways of learning and enter their career field of choice with confidence.

    Types of Gaming Degrees at UAT

    There are many types of gaming degrees you can choose from, depending on your interests and career goals. Some tap into your creative skills, while others are heavy in computer science and programming. Gaming offers opportunities for both “right brain” and “left brain” students – the creative types and those who want to get their hands into computer technology.

    Game Art & Animation

    Students in our computer animation degree program get started with game development, 3D design and creating digital worlds for multiple video game platforms. Students learn to combine artistic principles (such as color theory, lighting, shading, anatomy and life drawing) with a mastery of today’s top software tools.

    Game Design

    UAT’s game design program has been named one of the top gaming programs in the world since its start in 1995. Game Design students focus on the design principles and game documentation and prototyping to create innovative game projects. Our program emphasizes skills such as systems design, game balancing, play-testing and interactive storytelling so students get a holistic, hands-on education.

    Game Production (MS)

    We also offer a Master’s level Game Production degree for those looking to hone their skills and prepare for a successful career in game production. This coursework covers in-depth game production principles, as well as the Business of Gaming and Marketing. Each program is designed to meet your needs, improve your individual skills, collaborate on community projects and learn real-world applications.

    Game Programming

    Our Game Programming degree (a.k.a. Game Coder degree) helps students develop a broad coding skill set and prepare for a career in game programming. In this program, Game students master coding and programming principles, video game programming disciplines, C++ programming, data handling, game engine architecture, artificial intelligence and more. The result is a well-rounded, highly-applicable education that can be carried over into a rewarding career.

    Where to Get a Game Studies Degree

    So, you’ve decided to pursue a gaming degree – where do you start? Fortunately, you have many options available to you. We strongly encourage you to get a degree in your field, as this will help set you up for success and equip you with the skills needed to land a job after graduation.

    Technical College

    Technical colleges are career-specific and focus on the skills you need for your chosen career and less on general education courses. Technical college programs tend to be fewer than 4 years in total and graduate students with a degree, diploma, or certificate.

    University Program

    Another option is to earn a Bachelors or Masters degree at a 4-year university. This is a common path for those looking to get the full university experience and obtain a holistic education. At UAT, we offer a year-round game degree program that allows students to graduate in 3 years or fewer. Less time in school means you can enter the workforce and start earning a salary sooner than traditional 4-year schools.

    Online Degree

    There are a variety of online programs where you can learn more about video game design and programming or animation. Some examples include full-time or part-time courses, online bootcamp, or rudimentary courses. At UAT, we offer both online and flexible options for students wanting to learn remotely and on their time.

    How to Become a Game Designer

    Becoming a game designer is made easier when you have a game design degree under your belt. Today’s employers are looking for applicants with experience who both have a love of gaming and who have mastered the fundamentals of game design.

    Here are the basic steps to becoming a game designer:

    Step 1: Apply to a Game Design Program

    Choose from a variety of game design program options (university, technical college, online, etc.) to acquire a game design degree. This program could be close to home or in another city, state, or country – whatever works for you! You can even tailor many programs to suit your schedule.

    Step 2: Take Relevant Coursework

    Be sure to review the course curriculum for your program to see what you will be learning and in what timeframe. Hands-on experience, technical skill development and group projects are the norm in a gaming degree program. The more you absorb, the better prepared you will be to graduate on time and enter the job market.

    Step 3: Get Started with an Internship

    UAT has found that the key to most students’ success is gaining relevant experience while they are still in their degree program. An internship gives you the chance to practice your skills and network with other professionals in your industry. This can help you enter the job search with confidence and hands-on experience.

    Step 4: Apply for Game Design Jobs

    Once you’ve graduated from your program, it’s time to fine-tune that resume and apply for game design jobs. At UAT, we provide career counseling to help students prepare for this process. We also have a job board and host job fairs to help students find opportunities.

    Some other places to search for game design jobs include:

      • Google
      • LinkedIn
      • Glassdoor
      • ZipRecruiter
      • Indeed

    What Gaming Students Are Saying About UAT

    It’s one thing to rattle off job prospects and salaries associated with a career in gaming, but another to hear directly from students what their experience has been in a game design program.

    At UAT, we care about our students – from when they first begin their program until they land a job in their field. We do our part to set students up for success and this is evident in the reviews we get from our graduates.

    Read testimonials from past and current Game Studies students:

    “I've always loved video games and decided I wanted to study Game Art and Animation. When I found out that UAT was huge in game studies, I decided it was the right place for me. I love learning about my passion knowing that I'm starting my dream career now! The professors are so awesome and will make time to answer questions, give feedback and helping students whenever they can.” - Tina G

    “The school computers have the entire Adobe suite, editing software, 3DS Max, and Maya installed on them. Not only that, if you get to know people, then you'll realize that they have connections like crazy and there are always networking events going on. I already have an internship and I'm only on my second semester!” - Andrew V

    “When I finished my undergraduate program, I left UAT with a solid knowledge and understanding of what it took to make games and how to get that career path started.” - Joshua M

    Get A Gaming Degree at UAT

    UAT offers four game study majors - Game Art & Animation, Game Design, Game Programming and a Master’s in Game Production. If you have an interest in designing virtual worlds, creating unique characters and bringing animations to life, attending UAT may be right for you.

    Video Game Design Studies at University of Advancing Technology

    Request more information to learn more about our degrees and apply when you're ready to go for it. Game on!

    read more
    less

    Need Work? Job Opportunities Available Now for Students


    Hey students… Looking for a job? Check out the following roundup of local opportunities! The city of Tempe is planning a citywide job fair on July 21 and 28. Participating businesses will take applications and interview on the spot. ...

    Hey students…

    Looking for a job? Check out the following roundup of local opportunities!

    The city of Tempe is planning a citywide job fair on July 21 and 28. Participating businesses will take applications and interview on the spot. Find the list of businesses and more details hereNames and addresses of the companies are included, as well as their benefits and business perks. 

    Temple Job Monsoon Citywide Job Fair

    On July 20, from 6:00 – 7:00 p.m., Professor Aaron Jones and his FLOSS group (the Phoenix Linux Users Group) will hold their quarterly career night at Boulders on Southern, 1010 W Southern Ave in Mesa. They'll be offering resume reviews, so students can bring their resumes and questions for assessment by tech industry veterans. They will help with content, display and editing. Find out more here. The group will also share job and networking opportunities, specifically including a hardware tech/windows admin position.

    Resume

    Or—find a job right on the University of Advancing Technology Campus! Thursday, July 22, come to the UAT Café from 12:00–2:00 p.m. for the Student Worker Job Fair. From jobs in the bindery to the dorm, there are many positions available to work without leaving the school grounds. Come looking sharp and interview ready!

    UAT Student Job Fair

    If you can’t make it, check out the UAT Discord/Geek Rho channels where openings are posted, email careerservices@uat.edu for job support and opportunities, or visit https://learn.uat.edu/uat-student-jobs. Members of our Career Services team regularly post jobs from game programming to data science. The team is committed to helping UAT students and alumni find success both in class and in the industry. 

    Good luck, and go get that job!

    read more
    less

    What is a WAF?


    A Defense Against Common Cyber Threats A web application firewall, or WAF, is a filtering and monitoring tool that can function in the space between a website or application and the internet. A WAF is used to defend against numerous common threats and can be combined with other tools to create a layered approach to...
    A Defense Against Common Cyber Threats
    A web application firewall, or WAF, is a filtering and monitoring tool that can function in the space between a website or application and the internet. A WAF is used to defend against numerous common threats and can be combined with other tools to create a layered approach to security that enhances your protection tremendously. 
     
    The WAF can look and potentially defend against cross-site forgery, SQL injection, cross-site-scripting or XSS, and other forms of attack. If someone decides to execute a distributed denial of service attack against your server, you can quickly implement policies that will assist in mitigating the attack. This can be done in combination with other tools to help counter act malicious traffic.
     
    There exist three typical types of WAF and each has positives as well as negatives when deployed in your stack. You can deploy a standalone box that functions as a WAF for your network. It may cost a large amount of cash and often requires a dedicated team to provide care and maintenance for. You could also deploy a software based WAF like a plugin for a WordPress site. This type of WAF is typically localized and focused on protecting one asset. Prices vary but are often less expensive but provide less features as well.
     
    The final type of WAF would be a cloud-based solution provided by a company who handles your DNS. Cloudflare provides a WAF to their customers and this solution can vary wildly in price. A major issue with a cloud-based solution is that you are completely at the mercy of your provided and rarely have insight into their methodology, so you must have a high level of trust with said provided.
     
    Choosing a WAF is an important decision that will be dictated by your budget, skill level, and functional need. You should also spend time monitoring the current traffic of your site while reviewing what attacks are being deployed against you to best choose what tool to deploy. You should weigh each option carefully and then commit to implementing the tool that you are interested in as part of a greater security plan.
     
    Cyber Security Laptop  

    Find out more about the Cyber Security Degrees offered at UAT! 

    Leading cyber security education in the southwest, University of Advancing Technology (UAT) has surpassed 20 successful years since the inception of its elite Network Security degree program. As one of the longest-running cyber security degrees in the southwest, our complete continuum of undergraduate and graduate cyber security degrees have prepared thousands of ethical hacking, network security, and cyber security graduates. The NSA has designated UAT as a CAE training center in cyber defense.

    Visit University of Advancing Technology for more information on all our cyber security majors.

    read more
    less