header partial here
1
2
3

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

Next
Previous
 
Next
University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By clicking submit, you verify you are at least thirteen years of age, give us permission to store and process your personal information submitted above, and contact you through email, post, SMS, phone, autodialed and/or pre-recorded telemarketing. Carrier fees may apply to SMS messages, which can be opted out of at any time by replying STOP. Read our privacy policy here. Please note that such consent is not required to attend UAT and you may update your communication preferences at any time.
Previous
 
Submit

ABOUT UAT
University of Advancing Technology is an elite, private college that serves its student body by fostering knowledge creation and academic excellence in an environment that embraces the young technophiles of the world. With three centers of research and a suite of technology-centered undergraduate and graduate degrees, the University is a recognized leader in technology education.

Learn More About UAT

    UAT Cyber Ninjas Shine in the National Cyber League Competition


    When it comes to cybersecurity, the pressure is real, the stakes are high, and only the sharpest digital defenders rise to the challenge. This fall, University of Advancing Technology’s (UAT) Cyber Ninjas stepped confidently onto the virtual battlefield of the...

    When it comes to cybersecurity, the pressure is real, the stakes are high, and only the sharpest digital defenders rise to the challenge. This fall, University of Advancing Technology’s (UAT) Cyber Ninjas stepped confidently onto the virtual battlefield of the National Cyber League (NCL)—a nationwide competition that tests the skills, strategy, and grit of the next generation of cyber professionals.

    Competing in Cyber 

    NCL is a nationwide cyber competition where teams compete against each other to solve as many cybersecurity-related puzzles as possible. The NCL provides numerous puzzles that can be solved in any order, covering many topics in cybersecurity, including open-source intelligence (OSINT), cryptography, password cracking, scanning and reconnaissance, wireless access exploitation, web application exploitation, enumeration and exploitation, log analysis, and forensics.

    The Ninjas began training for the competition this summer by working through the NCL provided practice 'gyms' that provided dozens of practice questions that are easier than the ones that will appear in the actual competition. They also utilized other practice platforms including TryHackMe.

     

    ncl score

    This year's competition included 4,100 teams with each team having a maximum of 7 members. Every puzzle solved gives the team a number of points based on the difficulty of the puzzle with a range from 10 to 60 points. When it came time for the actual competition, the UAT Cyber Ninjas came prepared. As a result of their hard work, the Ninjas finished in 115th place with a total of 2450 points out of a maximum 3000. They bested their last years completion of 73% by completing 83% of the 2025 competition.  

    This year's team consisted of Boone Stewart, Jason McDaniel, Jayse Monty, Daniel Drljaca, and Nicholas Honkus. They also received help from other UAT students Dylan Maxwell and Keegan Heaton, as well as UAT Alumnus and 2024 Valedictorian Ozzy James.

    Building Resilience 

    UAT couldn’t be more proud of the Cyber Ninjas and the way they represented the university throughout the National Cyber League competition. Their grit, collaboration, and technical excellence shined from start to finish, showcasing exactly what it means to be a UAT innovator and problem-solver. This team not only demonstrated their individual talent but also embodied the spirit of our cyber community—driven, curious, and ready to defend the digital world. Their performance reflects the strength of UAT’s cybersecurity programs and the bright future ahead for every student who steps into the arena.

    Think you’ve got what it takes? Check out UAT’s cybersecurity programs and get started on a hands-on, challenge-driven cyber education.

    read more
    less

    Cybersecurity Awareness Month: A Human Approach to Digital Safety


    Every October when Cybersecurity Awareness Month arrives it can feel like a steady stream of reminders: Update your devices. Use better passwords. Beware of suspicious links. Those reminders are important, but they fail to capture everyday moments where security...

    Every October when Cybersecurity Awareness Month arrives it can feel like a steady stream of reminders:

    • Update your devices.
    • Use better passwords.
    • Beware of suspicious links.

    Those reminders are important, but they fail to capture everyday moments where security matters the most. In my work as a security analyst, I have learned many tools to combat cyber threats. Parenting four daughters has taught me something entirely different: Practical safety grows from conversations, small rituals, and the way we treat each other when mistakes happen. This piece is about that quieter work.

    Private moments that changed my view:

    One night I observed my daughter Ellie, hunched over a laptop, twenty tabs open, each promising an answer. The first tab offered a free copy of a textbook. It was the top result – surely a promising solution!

    I realized something in that moment. Technical advice rarely reaches people when they are exhausted or pressed for time after a long day of classes or work. The tools and rules exist but are only helpful if they fit into real life, into shortcuts and deadlines, into the small decisions people make while juggling work and family.

    Zoie came to me one night asking why a friend had suddenly disappeared from a group chat. She showed me screenshots of messages that looked like account recovery prompts. We walked through the messages together and discovered subtle changes in tone and punctuation that revealed a scam. She was relieved to understand what had happened. She was also quietly proud that she had not reacted by handing over credentials. Those small wins are more powerful than any presentation slide.

    From analyst to parent, and what both roles teach me:

    Working as a security analyst gave me a map of threats, attack chains, and mitigation strategies. It taught me to look for patterns and to assume adversaries will probe the weakest link. But being a dad refined that map. It taught me how fatigue, embarrassment, curiosity, and convenience shape behavior. It taught me that people do not act in the sterile conditions of lab exercises. They act while caring for younger siblings, rushing to a meeting, or trying to meet a deadline. They act while trying to help a parent or keep a promise.

    My parents recently offered a different perspective. I call Mom when I need to slow down and explain things simply. She asks direct questions that cut through jargon. My father asks about the practical outcomes. When I walked my father through how to spot a fraudulent phone call, he said, I wish someone had shown me this years ago. His response reminded me that security advice must be approachable for everyone, not just those comfortable with technology.

    My older brother is the kind of person who believes most problems can be solved by asking the right neighbor. He is skeptical of doom-laden headlines and helpful in pointing out when I am overcomplicating a message. His input keeps my language grounded. When I craft tips for students or families I imagine explaining them to him over coffee. That mental audience makes the advice practical.

    UAT cyber student project (1080 x 1920 px) (1200 x 800 px) copy 4

    Simple rituals that actually work:

    I have learned that a few predictable habits can reduce a lot of risk. Each Sunday evening I sit with a cup of tea, check for software updates, look at account activity, and confirm backups are running. The ritual takes about fifteen minutes, and it buys calm for the week ahead. It is not dramatic. It is not heroic. It is reliable. I teach this to students not as a strict rule, but as an invitation. Build a ritual that matches your life and your rhythm.

    Using unique passwords for each account became feasible for me the day I adopted a password manager. I still remember the first breach notice I received for a service I rarely used. Because I did not reuse credentials, the breach was an inconvenience not a crisis. That feeling of containment is worth the small effort of adopting one secure tool.

    When I work with families, I emphasize pauses. Teach kids and colleagues to pause before clicking. Take one breath. Verify the sender. Ask a trusted person. The single act of stepping back interrupts the reflexive click and often prevents harm. Pauses are small and humane. They respect that people are busy and human.

    Teaching without shame:

    When a student admits they clicked on a phishing link, I respond with a clear recovery plan and an invitation to learn. Shame silences people and prevents the important conversations that follow mistakes. I encourage students to treat incidents as case studies that can be deconstructed without judgment.

    I also bring my security analyst stories to class, not as proof of expertise, but as lived examples. One time an alert in a corporate environment pointed to irregular login attempts from a foreign country. We tracked the pattern and found a reused password across a poorly secured service. That incident became a teaching moment, a story about habits rather than villains. Students remember the narrative and the recovery steps more readily than a list of technical controls.

    Conversations at home:

    My daughters have taught me how to adapt conversations to age and temperament. With Samantha, the oldest, the conversation is about privacy and reputation because she is navigating professional and academic spaces. With Zoie I emphasize skepticism, spotting inconsistencies in messages, and validating sources. Ellie enjoys gaming communities, and our conversations focus on account controls and healthy boundaries. Daymi, younger and curious, benefits from gentle rules and clear explanations about what sharing means in a public space.

    It helps to begin as a dialogue with a question. No lectures. I ask what they saw, what surprised them, and what felt uncomfortable. Those questions open discussion and promote cyber safety from curiosity rather than fear. When my daughters come to me with a confusing message or a new app request, we sit together, and we discover together. The search and the discussion teach them how to think about risk.

    Supporting older relatives:

    My parents call me when they are unsure about a banking email, a caller claiming to be from a utility, or a message that demands immediate action. I cannot assume they adopt every technological control I recommend. Instead, I focus on a few essential protections and on ways to make verification easy.

    One night, a caller asked my mother for personal details to correct a records problem. She called me. I guided her through verifying the claim without giving any personal information. We contacted the official organization directly through a published number. Those steps matter because they reduce anxiety for everyone involved and preserve dignity for those who are targeted.

    Recovering from mistakes:

    If something goes wrong, the response matters. Quick containment, clear steps to recover, and reassurance will reduce harm. When a student in my class had their credentials stolen, we walked through resetting passwords, enabling multi-factor authentication, and reviewing account activity. We also discussed how to inform affected contacts. The immediate technical steps helped recover access. The supportive classroom response reduced the shame and encouraged others to share similar experiences.

    Emotional recovery is part of resiliency too. Teach friends and family how to respond if someone is scammed. Offer help, not blame. Guide them through practical recovery steps and, when appropriate, involve financial institutions. The social response can determine whether people seek help or hide incidents out of embarrassment.

    UAT cyber student project (1080 x 1920 px) (1200 x 800 px) copy

    Final thoughts:

    Cybersecurity Awareness Month is a useful reminder to inspect our defaults, renew conversations, and refine our habits. It is also an invitation to treat security as a shared human project. Tools matter, frameworks matter, and so do stories. When we lead with empathy, patient explanation, and small predictable rituals, we make security part of ordinary life.

    When someone slips up, respond with help, not judgment. When we teach, teach with the real rhythms of life in mind. When we design systems, design for the person who will use them while juggling work, family, and fatigue.

    Security is not a test you pass once. It is a set of practices woven into daily life. It is the short pause before you click. It is the conversation with your daughter about why a message looks off. It is the call you make to a parent to verify a strange demand. It is the neighborly nudge from a brother who asks you if you are overcomplicating something. That is where meaningful safety lives. 

    Rather than a steady stream of cybersecurity reminders in October, we can offer a steady stream of patience and guidance in building secure practices with colleagues, students and loved ones every day.

    References

    National Institute of Standards and Technology. (2022). Cybersecurity awareness training impact study. U.S. Department of Commerce. https://www.nist.gov/publications/cybersecurity-awareness-training-impact-study

    Verizon. (2023). 2023 Data breach investigations report. https://www.verizon.com/business/resources/reports/dbir/

    Protect your future in tech — explore UAT's cybersecurity degrees today!

    read more
    less

    Cyber Lessons from the FBI during Cyber Security Awareness Month


    UAT hosted FBI Agents to discuss Cyber Security careers and pathways. ...

    UAT hosted FBI Agents to discuss Cyber Security careers and pathways.

    In September, the University of Advancing Technology (UAT)  welcomed a special guest from the Federal Bureau of Investigation to campus. Joseph Hooper, Assistant Special Agent in Charge of the FBI’s Cyber Security Division in Phoenix, visited to share lessons learned from a recently adjudicated case and to highlight practical tips for staying safe online.

    The timing of his visit was especially fitting, as October marks Cyber Security Awareness Month, a nationwide initiative to promote safe digital practices. Hooper emphasized that while threats evolve, good habits make all the difference. His key advice included:

    • Take a two-factor approach to everything. Strengthen your defenses with multi-factor authentication whenever possible.

    • Be wary of phishing. A suspicious email, text, or link could be an attempt to steal your information.

    • Recognize social engineering. Attackers often exploit human behavior, not just software weaknesses.

    • Validate identities in business. Especially in HR, in-person validation and regular audits are essential to ensure employees are who they say they are.

    Screenshot 2025-09-24 at 5.05.35 PM

    UAT was honored to host the FBI for this important discussion. By connecting students, faculty, and the community with experts on the front lines of cyber defense, we continue to prepare future innovators to lead the way in protecting digital spaces.

    Ready to Become a Digital Defender?

     

    Take the first step toward a cyber security career. Request information or apply today — it's quick, easy, and there’s no application fee. 

    Together, we can build a safer digital future. Start your journey at UAT today!

     

    read more
    less

    Cyber Ninjas: Building Community and Tackling Real-World Cyber Challenges


    At University of Advancing Technology (UAT), Cyber Security isn’t just about textbooks and theory—it’s about collaboration, competition, and applying skills in real-world scenarios. That’s where the Cyber Ninjas come in....

    At University of Advancing Technology (UAT), Cyber Security isn’t just about textbooks and theory—it’s about collaboration, competition, and applying skills in real-world scenarios. That’s where the Cyber Ninjas come in.

    The Cyber Ninjas are a student-driven cybersecurity group at UAT that brings together passionate, like-minded individuals to learn, grow, and have fun while tackling today’s toughest cyber challenges.

    Alexis Sloan, a UAT Cyber Security and Technology Leadership student, explains: “The reason why I joined the Cyber Ninjas was to get more involved within the group, represent girls in the community, and work on exciting projects like the National Cyber League.”

     

    The Cyber Ninjas compete in several competitions including:

    • National Cyber League (NCL): A nationwide competition that challenges students in areas like cryptography, forensics, and penetration testing.
    • Collegiate Cyber Defense Competition (CCDC): A fast-paced event where students defend systems against live cyberattacks.
    • Capture the Flag (CTF): Hosted by government organizations, this program pushes students to solve puzzles, analyze code, and simulate real-world cyber defense scenarios.

    These competitions aren’t just games—they’re opportunities to build teamwork, sharpen skills, and prepare for careers in cybersecurity.

    “The best part of being in NCL is that it gives us a work-like setting. We work together to face real-life challenges in a controlled area.” – Jaylan McCoy, Network Security 

    Cyber Ninjas meet every Friday at 2:00 p.m. to collaborate, share knowledge, and practice for upcoming competitions. These sessions combine learning with camaraderie, creating an environment where students can experiment, fail safely, and grow stronger together.

    “It enhances my education because I am able to learn how to incorporate Artificial Intelligence (AI) into Cybersecurity, and Cybersecurity into AI.” – Ozzy James, Network Security, Network Engineering, AI

    Being part of the Cyber Ninjas means:

    • Building technical skills in a supportive, team-based environment.
    • Competing in high-profile cybersecurity challenges.
    • Gaining experience that mirrors real-world workplace collaboration.
    • Having fun while preparing for a career on the digital frontlines.

    The Cyber Ninjas have combined the camaraderie of a UAT Club with the competitiveness of a team, and they welcome any and all majors to join them!

    Ready to learn more about the Cyber Ninjas or UAT's Cyber Security Degree options? Request Info Today!

     

    read more
    less

    Cyber Security Awareness Month - UAT Tech Tangents Podcast


    At University of Advancing Technology (UAT), Cyber Security Awareness month is a time where students, staff and the community gather together to share tips on making the world a better place. ...

    At University of Advancing Technology (UAT), Cyber Security Awareness month is a time where students, staff and the community gather together to share tips on making the world a better place.

    October marks Cyber Security Awareness Month, and at the University of Advancing Technology (UAT), we’re diving straight into the conversation with a brand-new episode of our Tech Tangents podcast, featuring Robert Walker, Director of Community Initiatives, and Dr. David Bolman, UAT Provost. 

    In this kickoff episode, Robert and Dr. Bolman explore the journey of where cyber security started and how it has rapidly transformed over the years. What began as a handful of bad actors testing early networks has evolved into a landscape where AI-driven threats and the Internet of Things (IoT) have made hacking more prominent—and more dangerous—than ever before .Check out the episode in full here -

    Screenshot 2025-09-30 at 3.50.13 PM

    They also highlight how threat agents aren’t just virtual anymore. With the rise of interconnected devices and smart systems, cyber and physical vulnerabilities often overlap, creating new risks that demand constant awareness.

    And while you’ve likely heard the classic tips—use strong passwords, enable multi-factor authentication, and keep your systems updated—Robert and Dr. Bolman stress one overlooked but critical best practice:

    👉 Be mindful of what you share on social media. Posting vacation pictures in real time or broadcasting your location makes it easier for threat agents to combine digital footprints with physical opportunities. Sometimes, safety starts with silence. Check out the episode in full here - 

    This Cyber Security Awareness Month, join us in staying sharp, staying informed, and staying safe. Interested in starting you cyber journey, learn more about our degree options here.

    read more
    less

    Tech Camp Caps Off Stunning Camp Season at UAT


    University of Advancing Technology (UAT), caps off stellar camp season with annual Tech Camp with New Way Academy which gives students a technological taste of college life. ...

    University of Advancing Technology (UAT), caps off stellar camp season with annual Tech Camp with New Way Academy which gives students a technological taste of college life. 

    Camp Traditions

    What began as a simple school partnership has evolved into a powerful annual tradition. Students from New Way Academy — a school serving bright learners who thrive in personalized learning environments — now look forward to this event as a rite of passage. For many, it’s their first time staying overnight on a college campus. For some, it’s the moment they realize they belong in the world of tech. 

    Each day is thoughtfully curated to provide a blend of practical skills, creative exploration, and good old-fashioned fun. UAT professors and staff lead engaging demos and workshops designed to spark curiosity and confidence. Some highlights from this year’s lineup included:

    Screenshot 2025-08-05 at 12.10.28 PM

    The students also had an opportunity to learn traditional art drawing and maker and fabrication techniques in building smart infrastructure. 

    Screenshot 2025-08-05 at 12.07.56 PM

    But the learning wasn’t limited to the classroom. Campers also got a behind-the-scenes look at UAT’s cutting-edge spaces—including the Maker and Fabrication Lab, Motion Capture Studio, Art Studio, Security Operations Center, and Think Tanks—each one offering a glimpse into real-world innovation.

    Screenshot 2025-08-05 at 12.07.08 PM

    And of course — they didn’t go home at the end of the day. Students stayed overnight in the UAT dorms, getting a real taste of college life in a safe, supportive environment.

    Screenshot 2025-08-05 at 12.08.33 PM

    Building Futures, One Year At a Day

    This partnership speaks to something greater than STEM demos and campus tours — it represents what happens when you trust students with real tools, real challenges, and real respect. Year after year, UAT and New Way Academy prove that when education is tailored to the learner, anything is possible.

    We are honored to continue this decade-long tradition and can’t wait to welcome the next wave of New Way innovators.

    Ready to Shape the Future?

    Whether you're taking your first step into tech or you're ready to go all-in on your own innovation journey…


    👉 See What You Can Study at UAT

    We're the university built for future creators—and it all starts here.

    read more
    less

    Meet the Faculty: Cyber Security


    University of Advancing Technology (UAT) offers a suite of Cyber Security Degrees, including Bachelor of Science Degrees in Network Engineering, ...

    University of Advancing Technology (UAT) offers a suite of Cyber Security Degrees, including Bachelor of Science Degrees in Network Engineering, Technology Forensics, Network Security and a Master of Science Degree in Cyber Security. Additionally UAT is designated as a Center for Academic Excellence by the National Security Agency in cybersecurity. The Cyber Security Faculty have a vast amount of real world experience, they are seasoned veterans in the field who are passionate about teaching the next generation of cybersecurity professionals.

    Cyber Security GIFS

    Dr. Briant Becote

    Professor Becote retired from 23 years of U.S. Navy service as a Lieutenant Commander, Naval Flight Officer, in December of 2023, having served in a variety of leadership roles including Director of International Affairs: Egypt, Qatar, and Director, Tactical Operations Center for Maritime Aviation in the Middle East.  His duties included technical, logistic, and operational execution spanning over 15 countries globally.  

    His research interests span both offensive and defensive cyber operations, focused on malware analysis, programming, wireless technology, organizational technology, and incident response.  He is PMP and CISSP certified.

     

    Cyber Security GIFS-2

    Aaron Rodriguez

    Professor Aaron Rodriguez is an Air Force Veteran which has served in military and contract support for various government agencies including supporting worldwide security efforts. Aaron has planned and managed Computer Incident Response Teams (CIRT) and multiple cyber training operations.  He has several years of information technology background with a specialty in cyber security and information protection. Aaron graduated from Grand Canyon University with a Bachelor's in Information Technology and a Master's in Cyber Security and Information Assurance. 

     

    Cyber Security GIFS

    Dr. Dan Wilkins

    Dan Wilkins has over 30 years of experience in Computer and Information Security Industry. He is an Army Veteran and has served in military and contract support positions for various government agencies including worldwide security efforts. Dan has planned and managed Computer Incident Response Teams (CIRT), Computer Forensics, Red team / Blue team exercises and multiple cyber scenarios including Industrial Control Systems and SCADA systems. He has GRC experience with International and U.S. based security legislative requirements and standards. He has served in various information security positions throughout his career to include: Chief Information Security Officer, IT Director, Cyber Crime analysis and response; Security Consultant; and Senior Cyber Security Engineer. 

    Dan is a 5 time author with International book publications, a business owner, and he has an art gallery with numerous original oil paintings.

     

    Cyber Security GIFS-2

    Professor Adam Zeiner

    I am a proud father of 4 girls and have one grandson. One of my hobbies is collecting Funko Pop’s and I am also into anime (totally Otaku!). I am originally from Arizona, but I lived in Seattle for the past 5 years. I have a Bachelor of Science in Information Technology and Master of Science from the University of Phoenix. I am currently going to school for my PhD in Management with a focus on Information Systems.  

     

    Learn More about UAT's Cyber Security Degrees Today!

     

    read more
    less

    Future Innovators Day Camp 2025: A Week of Wonder at UAT


    Hands-On STEM Adventures for Future Tech Leaders From June 23rd to 27th, University of Advancing Technology (UAT) transformed into a technological playground of...

    Hands-On STEM Adventures for Future Tech Leaders

    From June 23rd to 27th, University of Advancing Technology (UAT) transformed into a technological playground of possibility for 13 curious minds, ages 5 to 16, during our first-ever Future Innovators Day Camp.

    Throughout the week, our campus buzzed with the sound of discovery, laughter, and the occasional robotic beep as campers explored everything from artificial intelligence to drone design. While this was UAT’s debut day camp for K–12 students, it certainly won’t be the last.

    🧠 Daily Adventures in STEM

    Each morning began with excitement and anticipation as campers arrived on campus ready to explore a new STEM adventure. The days were thoughtfully structured around themes that blended technology, creativity, and hands-on learning. On Day 1, campers dove into the world of Drones & Robotics, programming Sphero robots and navigating custom-built mazes. Day 2 introduced them to the thrilling realm of Cybersecurity, where they created strong passwords and tried their hand at safe hacking simulations.

    Screenshot 2025-07-01 at 4.12.23 PM

    By midweek, the energy reached a high as campers built their own games and teamed up for a mini Game Jam during Game Design & Virtual Reality day. Laughter filled the labs as pixelated dreams came to life on-screen.

    Screenshot 2025-07-01 at 4.08.02 PM

    Day 4 took a deep dive into the future with AI & Coding. Campers trained their own AI models and explored how machines learn and make decisions. On the final day, imaginations soared in 3D Modeling & Digital Art, where campers created original characters in TinkerCad and animated them with Mixamo.

    But the learning wasn’t limited to the classroom. Campers also got a behind-the-scenes look at UAT’s cutting-edge spaces—including the Maker and Fabrication Lab, Motion Capture Studio, Art Studio, Security Operations Center, and Think Tanks—each one offering a glimpse into real-world innovation.

    Screenshot 2025-07-01 at 4.20.42 PM

    Beyond the tech, there was time for some classic camp fun—friendly games of ping pong, impromptu chess matches, and a strong sense of community that grew with each passing day.

    Screenshot 2025-07-01 at 4.17.59 PM

    Every afternoon closed with a student showcase, where proud parents gathered to witness the projects and presentations their campers created. From robot demos to animated characters, each showcase was a celebration of effort, imagination, and growth.

    🔮 What’s Next?

    We’re just getting started.

    The Future Innovators Day Camp returns in Summer 2026, and we’re launching a brand-new Overnight STEM Camp for high school students. Think late-night game builds, collaborative tech projects, and a taste of college-level learning at UAT.

    ❓ FAQs – Future Innovators Day Camp

    Who can attend the camp?
    Children ages 5–16 with an interest in STEM, tech, and hands-on learning.

    Do campers need prior experience with coding or robotics?
    Not at all! All skill levels are welcome—from curious beginners to budding engineers.

    What should campers bring?
    A water bottle, closed-toe shoes, and curiosity. All tech is provided by UAT.

    Are meals included?
    Yes. Lunch and snacks are included each day.

    Will there be a camp in 2026?
    Yes! Day Camp will return, and a new Overnight STEM Camp for high school students is in the works.

    Where can I learn more about UAT programs?
    Right here: Explore UAT Degrees

    🚀 Ready to Shape the Future?

    Whether your child is taking their first step into tech or you're ready to go all-in on your own innovation journey…


    👉 See What You Can Study at UAT

    We're the university built for future creators—and it all starts here.

    read more
    less

    UAT Student Bridges the Tech Gap for Senior Citizens in Phoenix


    At the University of Advancing Technology (UAT), we believe that innovation isn’t just about technology—it’s about people. This past Saturday, UAT Cyber Security student, Alexis Sloan, exemplified that belief when she volunteered her time...

    At the University of Advancing Technology (UAT), we believe that innovation isn’t just about technology—it’s about people. This past Saturday, UAT Cyber Security student, Alexis Sloan, exemplified that belief when she volunteered her time and talent to teach senior citizens the basics of IT at a local church in Phoenix, Roeser Church of Christ.

    With support from UAT’s Community Initiatives department, Alexis quickly answered a request for help by preparing a personalized tech session for 11 local seniors. Equipped with a handout she created herself, Alexis taught attendees how to navigate their tablets, recover accounts, and identify whether websites were safe—all while fostering meaningful conversations around online privacy and general location sharing.

    Each participant had their own device, and Alexis made sure every question was met with patience and respect. “They were so nice and really patient,” Alexis shared. “I had some free time and thought it sounded like fun—and it really was!”

    This event wasn’t just about learning how to swipe or tap; it was about building confidence in a digital world. And thanks to UAT’s swift coordination and commitment to service, Alexis was empowered to turn her knowledge into impact.

    UAT’s Community Initiatives department proudly facilitated this opportunity because we understand that true leadership means stepping up, showing up, and giving back. We are proud to support students like Alexis who carry our mission into the real world—where technology meets compassion.

    1123_SOC-Bunce9

    At UAT, we don’t just prepare students for careers—we prepare them to serve, lead, and innovate with honor. Our foundation is our community, and with every small act of service, we’re building a stronger one together.

    Join UAT’s Journey and Learn More today.

    read more
    less

    Hackers Are Using AI to Steal Your Data — Here’s What You Need to Know (and Why It Matters for Your Future)


    Originally Published On Cybersecurity Insiders ...

    Originally Published On Cybersecurity Insiders


    Artificial intelligence (AI) is transforming the tech world—but not just in ways you might expect. While it’s powering everything from smart assistants to self-driving cars, cybercriminals are also using AI to launch smarter, faster, and more targeted attacks.

    If you’re even thinking about a future in cybersecurity, ethical hacking, network defense, or emerging tech, here’s a real-world look at why your skills will matter more than ever—and how hackers are already using AI to try and stay one step ahead.

    AI in the Hands of Hackers

    Personalized Phishing

    Gone are the days of obvious “Nigerian prince” scams. Today’s phishing emails are written by AI that can sound like your professor, boss, or even a family member—crafted using info pulled from your public social media accounts.

    Deepfake Scams

    AI can now clone voices and faces. That’s right—deepfake videos and audio can impersonate people you trust, tricking you into clicking bad links or sending sensitive info. It’s not sci-fi anymore. It’s real—and it’s happening now.

    Smart Malware

    Hackers are using AI tools like WormGPT to code malware that learns as it spreads. These programs can rewrite themselves to avoid detection, automate attacks, and adapt to different security systems.

    How You Can Stay Ahead

    As a future cybersecurity pro, your role won’t just be reacting to these threats—you’ll be anticipating them. Here’s what you can start doing today:

    • Use Multi-Factor Authentication (MFA)
      Think of it as your digital seatbelt. Even if your password gets leaked, MFA helps keep your accounts safe.

    • Be Suspicious of “Too Good to Be True”
      If an email seems off, don’t click. Hover over links. Verify senders. Trust your instincts—and double-check everything.

    • Limit What You Share
      Your TikTok, IG, and LinkedIn bios can give hackers clues. Set your accounts to private and keep the oversharing in check.

    • Learn the Tech Behind the Threats
      The best way to fight back? Understand how these systems work. That’s where your future education comes in.

    Ready to Be the One Who Outsmarts the AI?

    Cybercriminals are evolving—and the world needs digital defenders who can stay ahead. At University of Advancing Technology (UAT), we don’t just teach you theory. You’ll build real-world skills in ethical hacking, network defense, and AI-driven security. Your classroom is the front line.

    👉 Learn. Experience. Innovate. Become the future of cybersecurity.
    🎓 Explore UAT’s Cybersecurity Degrees Now

     

    read more
    less

    More Than Grades: The Journey of UAT's 2025 Valedictorian, Ozzy James


    Every graduating class has its standouts—students who go above and beyond in their academics, involvement, and personal growth. For University of Advancing Technology's (UAT) Class of 2025, that standout is Ozzy James, graduating with three Bachelor of Science degrees in ...

    Every graduating class has its standouts—students who go above and beyond in their academics, involvement, and personal growth. For University of Advancing Technology's (UAT) Class of 2025, that standout is Ozzy James, graduating with three Bachelor of Science degrees in Network Security, Network Engineering and Artificial Intelligence (AI). Ozzy not only mastered the classroom, but also embraced every challenge, built a strong community, and remained true to his values. 

    When asked how he maintained academic excellence throughout his time at UAT, Ozzy’s answer was immediate and heartfelt: connections. “Having really good connections with friends and family, and strong faith in my beliefs—those were everything,” he shared. “They helped me through the tough times and reminded me to focus on myself. When I stopped taking care of myself, everything else started to fall behind.”

    This balance—between academic dedication and personal well-being—proved to be the secret to his success. His cyber team, professors, and loved ones became his foundation, helping him stay grounded while reaching for big goals.

    Two professors stood out as transformative influences: Professor Aaron Rodriguez and Dr. Briant Becote. “Professor Rodriguez was incredible. I had him for Personal Identification and Security—one of my favorite classes,” Ozzy recalled. “He’d sit down with us and make sure we really understood the material, and if he saw anyone struggling, he’d check in right away.” Then there’s Dr. Becote, who helped launch the UAT Cyber Ninjas team, which Ozzy now leads. “I met him in my CCDC class—Collegiate Cyber Defense Competition—and that’s where I really got into the hands-on side of ethical hacking. It’s something I’d always wanted to do, and he brought more and more of that to the school.”

    College wasn’t without its challenges. The most difficult moments came when major projects like SIP (Student Innovation Project) and boards collided with regular coursework—and a job on top of that.

    ozzy sip

    “It was overwhelming,” Ozzy admitted. “But leaning on my support system, especially professors like Dr. Becote and Professor Rodriguez, and just talking things out with friends—that helped a lot. Finding small ways to stay grounded made a big difference.”

    What helped him the most? Learning that constantly grinding wasn't sustainable. “Focusing only on school put me in a bad mental space. Once I started putting more time into my faith, my family, and just giving myself a break, everything else started to fall into place.”

    One of the biggest surprises during Ozzy’s college journey was personal growth—especially in confidence and communication. “In high school, I didn’t go out much. I didn’t really network or connect beyond my circle. But at UAT, my friends and professors pushed me to go to conferences like CactusCon, meet Arizona’s CISO, and attend AI talks and robotics events. That changed everything.” These experiences opened new doors—not just professionally, but socially and personally. “I’ve made so many connections, in cybersecurity and outside of it. It’s helped me see all the different aspects of this field.”

    cyber ninjas

    Post-graduation plans are still evolving, but Ozzy’s vision is clear: he wants to continue building community. “I’m looking for a job where I can do what I’ve done here—help others grow, stay connected, and raise awareness about cybersecurity threats. I want to keep leading, keep learning, and keep giving back.” In five to ten years, he sees himself still learning, and still deeply embedded in his field. “I love learning. I’ve always loved learning. Whether I’m leading a corporate team or mentoring students at a school, I just want to keep growing and helping others do the same.”

    Ozzy’s advice to underclassmen and incoming students? Don’t make college only about school. “If you focus only on your studies, you’ll burn out. But if you focus only on having fun, you’ll miss the point. The key is balance—school, self-care, family, faith, and fun. When you find that balance, everything else starts to work.”

    When Ozzy found out he was chosen as Valedictorian, it was a complete surprise. “I never aimed for recognition. I just wanted to do my best and learn everything I could. So finding out that my professors chose me to represent the class—it’s incredibly humbling. I honestly didn’t even know they voted on it,” he laughed. “But it feels amazing to know they believed in me.” Ever humble, he adds, “I think everyone’s hard work should represent our class, not just mine. But I’m honored.”

    Congratulations Ozzy, we are so proud of you and can't wait to see what you accomplish in your future. 

    Learn more about how to get your UAT journey started today! 

     

    read more
    less

    UAT Cyber Ninjas: Cyber Club and Competition Team


    At University of Advancing Technology (UAT), the Cyber Ninjas competition team stands as a cornerstone of our cybersecurity community. We're more than just a ...

    At University of Advancing Technology (UAT), the Cyber Ninjas competition team stands as a cornerstone of our cybersecurity community. We're more than just a club—we are a diverse group of passionate students united by our love for cybersecurity, dedicated to skill development, and committed to creating an inclusive environment for newcomers and veterans alike. 

    The UAT Cyber Ninjas welcome all students, regardless of their experience level. Whether you're taking your first steps into the world of cybersecurity or you've been breaking and defending systems for years, our team has a place for you. Our strength lies in our collaborative approach—experienced members regularly mentor newcomers, and everyone is encouraged to reach out to our Professors & Subject Matter Experts, Dr. Briant Becote and Aaron Rodriguez when faced with challenging problems. 

    Our training methodology centers around self-paced learning through the National Cyber League (NCL) Gymnasium and TryHackMe modules, which allows each member to progress according to their individual skill level and interests. This personalized approach ensures that everyone continues to grow their cybersecurity knowledge regardless of where they started. We also take knowledge learned in our amazing classes and apply it to the team and competitions. 

    IMG_1584 2

    The Cyber Ninjas participate in numerous competitions throughout the year, spanning both offensive and defensive cybersecurity domains. Our comprehensive approach includes competing in National Cyber League, Google CTF, Buckeye CTF, and Cat the Quest. Here, we hone our system exploitation, OSINT, and password cracking skills. On the defensive competitions, we regularly participate in the Collegiate Cyber Defense Competition (CCDC) and National Centers of Academic Excellence in Cybersecurity (NCAE) Games, where we focus on protecting networks and systems from active threats. 

    This balanced participation in offensive and defensive competition gives our members a holistic cybersecurity skillset. The challenges we face—from identifying vulnerabilities to implementing robust security measures—mirror real-world scenarios that cybersecurity professionals encounter daily. Many of our competitions involve time pressure elements that simulate the urgency of actual security incidents, preparing our members for future careers. 

    What makes these competitions particularly valuable is their global nature. By competing against teams from various backgrounds and expertise levels worldwide, our members gain exposure to diverse approaches and techniques. These international connections often lead to networking opportunities and knowledge sharing that extend beyond the competitions themselves. Therefore, creating a richer learning environment for everyone involved. 

    Our commitment extends beyond competitive events. The Cyber Ninjas actively engage with the broader cybersecurity community through various professional development opportunities throughout the year. We regularly attend industry conferences like CactusCon, where members network with security professionals, participate in workshops, and gain exposure to cutting-edge security research. These conferences often lead to internship connections and mentorship opportunities that help launch our member's careers.  

    The team also organizes and attends professional networking events that bridge the gap between academic learning and industry practice. These connections have proven invaluable for members seeking to understand current market demands and career pathways.  

    Recently, we had the privilege of meeting with Ryan Murray, Arizona's Chief Information Security Officer, to discuss the state's cybersecurity posture, AI integration in security operations, and valuable career guidance. These professional development opportunities provide our members with industry insights and connections that complement classroom learning, creating a more comprehensive educational experience. Meeting with industry professionals gives our members a clearer understanding of career pathways and current cybersecurity challenges, helping to bridge the gap between academic theory and real-world practice. 

    IMG_1586 2

    What truly sets the Cyber Ninjas experience apart is the lifelong connections formed while tackling complex challenges. When you join our team, you don't just gain technical skills—you build a professional network and friendship circle that extends far beyond graduation. Our members regularly describe the team as "finding their people" at UAT. The camaraderie developed during late-night competition preparations, celebrating victories at our traditional post-competition Sonic runs, or sharing a team Thanksgiving dinner creates bonds that last throughout your academic journey.  

    On campus, you'll often find Cyber Ninjas gathered in the Security Operations Center (SOC). This hub serves as our training ground, meeting space, and occasional movie theater where we combine relaxation with research during our regular movie nights. These informal gatherings help strengthen our team bonds while providing a casual space to discuss security concepts in a relaxed setting.  

    We pride ourselves on maintaining an open, supportive environment where anyone interested in cybersecurity can find their place. Whether you're looking to compete, learn new skills, or simply connect with like-minded tech enthusiasts, we invite you to be part of our journey in the ever-evolving world of cybersecurity. 

    Ready to step into the digital shadows with the Cyber Ninjas? Find us in the UAT SOC or connect with any team member—your journey into the fascinating world of cybersecurity begins with us.  

     

    read more
    less

    UAT Ranked among the Best: A top choice for Design, Safety and Student Life


    University of Advancing Technology (UAT) has achieved impressive standings in the 2025 NICHE rankings,...

    University of Advancing Technology (UAT) has achieved impressive standings in the 2025 NICHE rankings, reflecting its commitment to excellence across various degrees and college experiences. 

    #1 Best College in Arizona for Computer Science

    UAT has been honored as the #1 Best College in Arizona for Computer Science by Niche for the second consecutive year. This recognition underscores the university's dedication to providing cutting-edge education in computer science, preparing students to excel in a rapidly evolving field.

    #1 Best College in Arizona for Design

    Creativity and innovation are at the heart of UAT's design programs, leading to its ranking as the #1 Best College in Arizona for Design. Students have the opportunity to explore various design disciplines, from Game Design to Advertising Art, fostering a versatile skill set.

    _MG_0065

    #1 Best Fully Online College in Arizona

    UAT's 20+ degrees are all offered fully online allowing more students to access the excellence and innovation UAT has to offer. UAT recently revamped the Online format giving student more time to focus on mastering their coursework, staying on track for graduation, and ultimately achieving their academic goals with greater confidence and support.

    #2 Best College in Arizona for Information Technology

    Recognized as the #2 Best College in Arizona for Information Technology, UAT offers a suite of Cyber Security degrees including Bachelor of Science degrees in Network Engineering, Network Security, Technology Forensics, and a Master of Science degree in Cyber Security. UAT Is designated as a National Center for Academic Excellence (CAE) in Cybersecurity by the National Security Agency (NSA).

    078A1584-2

    #2 Best College Dorms in Arizona

    UAT’s Founder's Hall has been recognized as one of the best college dorms in Arizona, earning the #2 spot on Niche’s “Best College Dorms in Arizona” list two years in a row. This ranking reflects our commitment to providing students with a safe, modern, and comfortable living environment that enhances their campus experience. From suite-style rooms to an updated kitchen, collaborative community spaces like Tech Tanks and the streaming suiteUAT’s housing is not only steps to a few minutes walk from classrooms, cafe, and restaurants, and more, it's designed to support both technology-driven learning and a vibrant student life.

     

    #3 Best College in Arizona for Student Life

    UAT's vibrant campus life has earned it the #3 position for Student Life in Arizona. With a plethora of clubs, events, and networking opportunities, students can engage in a community that supports both personal and professional growth.

    078A3381-2

    #3 Safest College Campus in Arizona

    Safety is a top priority at UAT, leading to its ranking as the #3 Safest College Campus in Arizona. The university's commitment to maintaining a secure environment allows students to focus on their studies and campus activities with peace of mind.

    #4 Best College in Arizona for Food

    UAT's Cafe has been recognized as the #4 Best College in Arizona for Food. Offering a variety of nutritious and delicious options, the university ensures that students have access to meals Morning, Noon, Night and Late Night! 

    grill-inset2

    #4 Best College Location in Arizona

    Situated in Tempe, UAT boasts the #4 Best College Location in Arizona. The campus's proximity to tech hubs, cultural attractions, and recreational activities provides students with a dynamic and enriching environment.

    #6 Best College Campus in Arizona

    UAT's commitment to providing a conducive learning environment is reflected in its ranking as the #6 Best College Campus in Arizona. From the Security Operations Center (SOC) to the Digital Maker Lab, UAT offers access to advancing technology to their students 24/7.

    1023_Maker Lab Updates-12

    #6 Colleges with the Best Professors in Arizona

    The dedication and expertise of UAT's faculty have earned the university the #6 for Colleges with the Best Professors in Arizona. UAT hires industry expert faculty to teach the next generation of technology professionals. 

    2566053_InfographicUATNicheRankings_1080x1080_2_033125

    Learn more about all UAT has to offer today! 

     

    read more
    less

    TechFusion Conference: A Transformative Involvement for Students


    University of Advancing Technology (UAT) Cyber Security Student Alexis Sloan attended the AZ Tech Council Event on Tuesday...

    University of Advancing Technology (UAT) Cyber Security Student Alexis Sloan attended the AZ Tech Council Event on Tuesday March 25th. She discusses the opportunities and learning experience the event brings to students.

    Going to the TechFusion Conference was a priceless experience that gave profound insights into the quickly advancing world of innovation, Artificial Intelligence (AI), and cybersecurity. As an understudy, being surrounded by industry pioneers, trailblazers, and forward-thinkers provided an interesting viewpoint on the patterns forming the long-term work.  One of the most impactful sessions was the AI Change Board, where specialists talked about the down-to-earth applications of AI in commerce. A key takeaway was that AI ought to be seen as a collaborative tool, not a substitute for human insights. Peter Meyers emphasized the significance of small, vital AI ventures to assist organizations in constructing confidence in deployment. UAT Professor Tony Hinton, an AI ingenious, pushed for open-source AI instruments, making a solid case for open and cost-effective development.

    Screenshot 2025-03-26 at 11.54.55 AM

    Cybersecurity was another significant subject, with discourses highlighting the developing role of AI in both ensuring and challenging security frameworks. The Cybersecurity Career Methodologies session underscored how organizing and leveraging abilities like item administration and information science are key for standing out within the work showcase.  

    For undergraduates, going to this conference was more than a fair opportunity to learn—it was a chance to interact with experts, get real-world industry challenges, and pick up career experiences. The organizing openings were invaluable, strengthening that submitting resumes alone isn't sufficient in today's competitive job advertise. Discussions with experts have given clarity on developing job roles in AI, cybersecurity, and cloud computing.  Generally, TechFusion was an eye-opening experience that highlighted the significance of flexibility, ceaseless learning, and organization. For any student considering a tech career, going to such occasions may be a must—it bridges the gap between scholarly information and industry expectations, preparing us for a future driven by development.

     

    Learn more about UAT today! 

    read more
    less

    Sixth Day of Techmas: Six-Degree Suites


    On the sixth day of Techmas, we’re spotlighting the six-degree suites at University of Advancing Technology (UAT). These distinct yet interconnected areas of study define the innovative, hands-on educational experience...

    On the sixth day of Techmas, we’re spotlighting the six-degree suites at University of Advancing Technology (UAT). These distinct yet interconnected areas of study define the innovative, hands-on educational experience that sets UAT apart. With a focus on preparing students for the careers of tomorrow, each suite is tailored to explore cutting-edge technologies, foster creativity, and develop expertise in fast-growing industries.

    Creation & Simulation

    If you’re drawn to building, designing, and imagining futuristic solutions, the Creation & Simulation suite is your calling. From Digital Maker and Fabrication to Robotics and Embedded Systems and Human Computer Interaction, these degrees empower students to bring ideas to life, pushing the boundaries of technology and usability.

    Software Engineering

    Ranked #1 in Computer Science in Arizona, UAT’s Software Engineering family develops leaders in technology through degrees in Advancing Computer Science, Artificial Intelligence, Data Science, and a Master’s in Software Engineering. Students master coding, machine learning, and the art of problem-solving, preparing to innovate in fields that drive the digital world.

    Cybersecurity

    The Cybersecurity suite offers cutting-edge degrees in Network Engineering, Network Security, Technology Forensics, and a Master’s in Cyber Security, arming students with the skills to protect systems and data from cyber threats. UAT graduates are highly sought after in this ever-evolving industry, where demand for cybersecurity expertise continues to rise.

    Digital Arts

    For creative minds, the Digital Arts suite offers degrees in Advertising Art, Digital Marketing, and Digital Video. These programs blend artistic expression with technical expertise, preparing students for dynamic careers in media, branding, and content creation.

    Game Studies

    The Game Studies suite immerses students in the world of interactive entertainment. With degrees in Game Art and Animation, Game Design, Game Programming, and a Master's in Game Production and Management, UAT cultivates the next generation of game developers ready to shape this billion-dollar industry.

    Business & Innovation

    Future leaders find their niche in the Business & Innovation suite, featuring degrees in Business Technology, Technology Studies, and Master's degrees in Technology Innovation and Technology Leadership. These programs combine entrepreneurial thinking with technical skills, equipping students to drive change in tech-driven industries.

     

    As UAT celebrates innovation this Techmas season, these six degree suites highlight the diversity and depth of education that UAT provides—ensuring every student has the tools to thrive in the tech careers of the future.

     

    read more
    less

    Fifth Day of Techmas: Five Cybersecurity Facts


    As the Twelve Days of Techmas continue at University of Advancing Technology (UAT), we spotlight cybersecurity—a rapidly growing field...

    As the Twelve Days of Techmas continue at University of Advancing Technology (UAT), we spotlight cybersecurity—a rapidly growing field that protects our digital world. UAT’s Cybersecurity degrees, including the Cyber Security, Network Security, and Technology Forensics degrees, equip students with the expertise needed to address the evolving challenges in this critical industry. Here are five key cybersecurity facts to keep you informed and inspired.

    1. Cybercrime Costs Are Skyrocketing

    Cybercrime is predicted to cost the world over $10.5 trillion annually by 2025. UAT’s Cyber Security degrees train students in cutting-edge techniques such as threat detection, vulnerability assessment, and mitigation planning, preparing them to combat these costly risks.

    2. The Internet of Things (IoT) Is a Security Risk

    With over 18.8 billion IoT devices in use worldwide, these interconnected gadgets create significant vulnerabilities. Hackers can exploit weaknesses in poorly secured devices, threatening personal data and critical systems. UAT’s Network Security degree dives deep into protecting complex networks, including IoT ecosystems, empowering graduates to create safer connected environments.

    3. Human Error Is the Weakest Link

    A staggering 95% of cybersecurity breaches stem from human error, such as falling victim to phishing schemes or creating weak passwords. UAT’s hands-on curriculum, across all cybersecurity-related degrees, emphasizes technical and behavioral strategies to reduce these risks. Through degrees like Technology Forensics, students also learn how to investigate and prevent breaches caused by these errors.

    4. Artificial Intelligence Is a Double-Edged Sword

    While AI enhances threat detection, it also enables hackers to develop sophisticated attacks. UAT integrates AI training across its Cybersecurity and Advancing Computer Science degrees, ensuring students can harness its power responsibly while staying ahead of malicious actors.

    5. Cybersecurity Jobs Are in High Demand

    With an estimated 3.5 million unfilled cybersecurity jobs by 2025, opportunities in this field abound. UAT graduates leave with real-world experience that helps them stand out in the job market, ready to lead in roles such as penetration testers, forensic analysts, and network defenders.

    Ranked #1 in Computer Science in Arizona, UAT is committed to producing innovative cybersecurity leaders who protect and shape our digital future. Stay tuned for more insights during the Twelve Days of Techmas!

    Ready to Become a Digital Defender?
     

    Take the first step toward a cybersecurity career. Request information or apply today — it's quick, easy, and there’s no application fee. 

    Together, we can build a safer digital future. Start your journey at UAT today!

    read more
    less

    UAT Students Visit the FBI Field Office


    UAT Cyber Security Students Discover Opportunities at FBI Recruitment Event (Sorry, no pictures allowed at the field office!)...

    UAT Cyber Security Students Discover Opportunities at FBI Recruitment Event (Sorry, no pictures allowed at the field office!) 

    Recently, students from the University of Advancing Technology (UAT) studying Cyber Security had an incredible opportunity to attend an FBI recruitment event, opening their eyes to a variety of career paths within the Bureau. With the increasing importance of cyber defense and digital forensics, UAT students were particularly excited about how their skills could align with the needs of one of the nation’s top law enforcement agencies. 

    The event showcased a range of entry-level positions, each critical to the FBI’s mission of ensuring national security and public safety. Here’s a look at some of the roles that captured the students' attention: 


    Evidence Technician
    : Students learned about the crucial role Evidence Technicians play in collecting and preserving physical evidence from crime scenes. This position emphasizes attention to detail and a methodical approach, skills that many UAT students excel in. 

    Intelligence Analyst: For those with strong analytical skills, the role of Intelligence Analyst stood out. This position involves sifting through vast amounts of information to identify patterns and trends, making it a perfect fit for tech-savvy students. 

    Data Analyst: Similar to Intelligence Analysts, Data Analysts focus on interpreting complex datasets. UAT students appreciated how their training in data management could contribute to significant investigative efforts. 

    Digital Forensics Examiner: Given the focus on cybersecurity, many students were particularly intrigued by this role. Digital Forensics Examiners analyze digital evidence to uncover information about criminal activities, a key area where cyber skills are in high demand. 

    Digital Operations Specialist: Students saw this role as an exciting way to leverage their knowledge in managing and optimizing digital tools for investigative purposes. 

    Independent Contract Linguist and FBI Linguist: With the FBI’s focus on communication, these positions appealed to students with language skills, highlighting the diverse ways one can contribute to national security. 

    Electronics Technician: For those with a knack for electronics, this role supports the Bureau’s operations by maintaining and repairing essential equipment. 

    FBI Special Agent: The role of Special Agent captured the imagination of many, as it involves direct engagement in investigations and national security efforts. 

    Additionally, internal applicants learned about the Tactical Specialist position, which requires a specialized skill set for high-stakes operations. 

    The event allowed UAT Cyber security students to connect with FBI representatives, ask questions, and gain insight into the rigorous application process. With the FBI's commitment to building a skilled and diverse workforce, students left feeling inspired and empowered about their potential careers. As they look toward the future, the possibilities for making a difference in national security have never seemed brighter. 

    Ready to Become a Digital Defender?

     

    Take the first step toward a cyber security career. Request information or apply today — it's quick, easy, and there’s no application fee. 

    Together, we can build a safer digital future. Start your journey at UAT today!

     

     

    read more
    less

    Honoring Veterans at UAT: A Tribute to Service, Education, and Innovation


      On this Veterans Day, we express our deepest gratitude for the immense contributions veterans make to our country, both during their service and after they transition to civilian life. For many veterans, the journey doesn't end with their ...

     

    On this Veterans Day, we express our deepest gratitude for the immense contributions veterans make to our country, both during their service and after they transition to civilian life. For many veterans, the journey doesn't end with their military career; it evolves into new challenges and opportunities that shape their futures. At University of Advancing Technology (UAT), we are proud to support veterans in their educational journeys, providing them with the tools, mentorship, and community to thrive in the ever-evolving fields of technology and cybersecurity.

    Let’s spotlight some of the remarkable veterans at UAT who embody these values through their journeys:

    Navigating the Cybersecurity World: Briant Becote, PhD

    Briant Navy BootcampProfessor Briant Becote, a UAT Cyber Security professor, brings a wealth of experience from both the Army National Guard and the U.S. Navy. With over two decades of service, Becote’s military background includes working as a Surface Sonar Technician and later as a Naval Flight Officer. His career provided him with a unique blend of technical expertise and leadership skills, which he now imparts to his students.

    Becote’s path to teaching was shaped by his desire to give back to others. "The Navy offered me the opportunity to learn and grow through education," he shares. "After joining with only 12 college credits, I retired in December of 2023 with two master's degrees and a PhD, all without any student loans." This commitment to lifelong learning and personal growth is central to his approach as an educator.

    His experiences across 25 countries and in various military roles allow him to provide students with a global perspective on technology, leadership, and security. Becote’s work at UAT is driven by a deep understanding of the importance of mentorship and the desire to help students navigate the complexities of the cybersecurity field, just as he did in his own career.

     

    From Military Service to Educator: Aaron Rodriguez

    Fabcom_UATPortraits20245656Professor Aaron Rodriguez, a Cyber Security instructor at UAT, served 11 years in the U.S. Air Force, where he was an Aircraft Armament Specialist. His service took him to various locations around the world, from South Korea to Japan, and provided him with invaluable life lessons that continue to influence his work today.

    Rodriguez joined the Air Force with the goal of seeing the world—a goal that he certainly accomplished. Along the way, he learned the importance of patience, teamwork, and precision—skills that have seamlessly transitioned into his teaching philosophy. "The military lifestyle has been burned into my brain," Rodriguez reflects. "The most important quality I picked up was patience, and it has always helped me stay calm in difficult or uneasy situations."

    As a professor at UAT, Rodriguez is able to inspire and guide the next generation of cybersecurity professionals, many of whom are veterans like him. His experiences in the Air Force not only shaped his approach to education but also strengthened his commitment to helping his students succeed in the rapidly evolving field of cybersecurity. "The military fast-tracked skills that prepared me for what life had in store," he says.

    From Combat to Code: Alexander McPeake

    For Alexander McPeake, a veteran of the U.S. Air Force, the transition into the world of cybersecurity wasn’t an easy one—but it was one he pursued with determination. After suffering a traumatic brain injury, McPeake turned to education to redefine his career. "I wanted to work with computers, but coding wasn’t for me. I figured networking would allow me to do that without the coding," he explains.

    McPeake found a path at UAT, where he enrolled in an online degree program for networking engineering. UAT’s hands-on learning approach allowed him to gain the real-world skills needed to thrive in the fast-paced technology industry. Now, as a Master's degree student in Cyber Security, McPeake works as a data center engineer at Switch, a leader in exascale data center ecosystems.

    McPeake’s story highlights the importance of adaptability and resilience—qualities that veterans often develop during their military service and carry with them into their civilian careers. Today, he plays a crucial role in maintaining secure infrastructures at Switch, with aspirations to grow further into network security and security analysis. His journey underscores the transformative power of education and the opportunities that veterans have to reshape their careers in the technology world.

    Veterans in Technology: Ryan Golden and Nathan Parry

    13330987_10154285710337899_1879061090033605827_nAt UAT, veterans are not only finding educational success but are also becoming integral members of the technology community. Ryan Golden, an Army veteran who served in Iraq and Jordan, is currently pursuing a Data Science degree at UAT. His military background in unmanned aerial systems and Linux systems ignited a passion for technology and data. "The military taught me a sense of timelines and purpose, which now pushes me to go back to school and earn an official degree in Data," Golden says. His story is one of perseverance and dedication—traits that are invaluable in both the military and technology fields.

     

    Similarly, Nathan Parry, a Navy veteran who served for six years, is now pursuing a degree in Virtual Reality at UAT. His initial interest in network security shifted to VR, thanks to the launch of the Oculus Quest 2. Parry’s military experience has shaped his approach to education, helping him navigate the challenges of transitioning back to school and setting his sights on a future in virtual reality development. "UAT has been exceptional in providing the flexibility I need to balance school with my established life," Parry shares.

    UAT’s Commitment to Veterans

    These stories represent just a small sample of the many veterans who are thriving at UAT. The University’s commitment to supporting veterans is reflected not only in the tailored educational programs but also in the inclusive, flexible environment that UAT provides. Whether it’s through career-focused degrees or personalized support services, UAT is dedicated to helping veterans succeed as they transition into civilian careers in technology.

    On this Veterans Day, we honor the dedication, sacrifice, and resilience of veterans like Aaron Rodriguez, Briant Becote, Alexander McPeake, Ryan Golden, and Nathan Parry. Their stories are a testament to the strength of the veteran community and the power of education to transform lives. As these veterans continue to shape the future of technology and cybersecurity, UAT remains proud to be part of their journey.

    For those interested in following in their footsteps, UAT offers a range of degrees designed to empower veterans and equip them with the skills needed to succeed in the digital age. Whether you're interested in cybersecurity, data science, virtual reality, or another advancing technology field, UAT is here to support your educational goals and help you achieve success.

    Happy Veterans Day from UAT! Thank you for your service.

    read more
    less