header partial here
1
2
3

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

 
 
Next
Previous
 
Next
University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By clicking submit, you verify you are at least thirteen years of age, give us permission to store and process your personal information submitted above, and contact you through email, post, SMS, phone, autodialed and/or pre-recorded telemarketing. Carrier fees may apply to SMS messages, which can be opted out of at any time by replying STOP. Read our privacy policy here. Please note that such consent is not required to attend UAT and you may update your communication preferences at any time.
Previous
 
Submit

ABOUT UAT
University of Advancing Technology is an elite, private college that serves its student body by fostering knowledge creation and academic excellence in an environment that embraces the young technophiles of the world. With three centers of research and a suite of technology-centered undergraduate and graduate degrees, the University is a recognized leader in technology education.

Learn More About UAT

    Understanding and Addressing Common Cybersecurity Blind Spots


    October marks Cybersecurity Awareness Month, a crucial time for businesses and individuals alike to reassess their digital defenses. As we navigate an increasingly interconnected world, the need for robust cybersecurity measures cannot be overstated. A recent ...

    October marks Cybersecurity Awareness Month, a crucial time for businesses and individuals alike to reassess their digital defenses. As we navigate an increasingly interconnected world, the need for robust cybersecurity measures cannot be overstated. A recent article by Robert Walker, Director of Community Initiatives at University of Advancing Technology (UAT) in the Phoenix Business Journal highlights several common blind spots that organizations often overlook when it comes to cybersecurity. Let’s delve deeper into these issues and explore how proactive measures can mitigate risks.

    1. Employee Training and Awareness

    One of the most significant vulnerabilities in any organization's cybersecurity posture is the human factor. Employees, while essential assets, can inadvertently expose the company to threats through actions like clicking on phishing emails or using weak passwords. Regular cybersecurity training sessions are vital to educate employees about recognizing phishing attempts, understanding secure data handling practices, and maintaining vigilance in their digital interactions. At UAT, we prioritize comprehensive training programs to ensure our staff and students are well-equipped to face these challenges.

    2. Patch Management

    Software vulnerabilities are frequently exploited by cybercriminals to gain unauthorized access to systems. Yet, many organizations struggle with timely patch management. Failure to promptly apply security patches and updates leaves systems exposed to known vulnerabilities. Implementing a robust patch management strategy ensures that all software and systems are regularly updated, reducing the window of opportunity for attackers. UAT emphasizes the importance of maintaining updated systems, especially in our tech-driven curriculum.

    3. Mobile Device Security

    With the proliferation of mobile devices in the workplace, ensuring their security is paramount. Mobile devices often store sensitive data and connect to corporate networks, making them attractive targets for cyber threats. Businesses should enforce strong mobile device management policies that include encryption, remote wipe capabilities for lost or stolen devices, and regular security updates. At UAT, we encourage students to adopt best practices for securing their devices, preparing them for future careers in technology.

    4. Third-Party Risk

    Collaborating with third-party vendors and contractors can enhance business operations but also introduces cybersecurity risks. Many organizations overlook the security practices of their third-party partners, assuming they have adequate protections in place. Conducting thorough security assessments and requiring compliance with cybersecurity standards can mitigate these risks and ensure a more secure business ecosystem. UAT fosters partnerships with tech companies, ensuring that both students and partners understand the importance of cybersecurity across all collaborations.

    5. Data Backup and Recovery

    Data loss can cripple a ackupobusiness, yet insufficient or irregular data backup practices are prevalent. Ransomware attacks and other data breaches can result in critical data being encrypted or stolen. Implementing automated and secure backup solutions, along with regularly testing data recovery procedures, is essential to minimize downtime and ensure business continuity in the event of a cyber incident. UAT’s commitment to data integrity and recovery training prepares our students for real-world scenarios, ensuring they understand the importance of backup protocols.

    Conclusion

    As cybersecurity threats continue to evolve, so must our defenses. Addressing these common blind spots requires a proactive approach that integrates education, policy enforcement, and technological safeguards. By prioritizing cybersecurity awareness and implementing robust practices across all levels of the organization, businesses—and educational institutions like UAT—can better protect themselves from potential cyber threats and safeguard their valuable assets.

    This Cybersecurity Awareness Month, let's commit to strengthening our defenses and staying vigilant against emerging threats. Together, we can create a more resilient and secure digital landscape for everyone.

    At UAT, our suite of cyber security degrees and related fields prepare students to tackle these challenges head-on, equipping them with the knowledge and skills needed to excel in the ever-evolving tech landscape. Request information today and become part of the solution!

    read more
    less

    Secure Our World: Simple Steps for Cyber Safety


    October marks Cybersecurity Awareness Month, a time to focus on securing our digital lives. The theme for this year, “Secure Our World,” emphasizes that cybersecurity isn’t just for the tech-savvy—it’s for...

    October marks Cybersecurity Awareness Month, a time to focus on securing our digital lives. The theme for this year, Secure Our World,” emphasizes that cybersecurity isn’t just for the tech-savvy—it’s for everyone. In today’s hyper-connected world, taking proactive steps to protect your online presence is crucial. Here are four easy ways you can strengthen your cybersecurity today.

    1. Recognize & Report Phishing

    Phishing scams have evolved, becoming increasingly difficult to spot. Whether it’s an email asking for personal info or a suspicious link, these scams are red flags. Instead of engaging, report the phishing attempt and delete the message. Staying vigilant not only protects your data but also helps secure the broader network.

    Want to learn more? Explore CISA’s phishing resources for detailed insights.

    1. Use Strong Passwords

    Passwords are your digital gatekeepers. If you’re still recycling weak passwords, it’s time to upgrade. Strong passwords should be long and unique, combining uppercase, lowercase, numbers, and symbols. Better yet, use a password manager to keep everything secure and accessible.

    Need password tips? Check out the NIST guide on creating strong passwords.

    1. Turn On Multi-Factor Authentication (MFA)

    A single password isn’t enough in today’s digital landscape. Multi-Factor Authentication (MFA) adds a critical layer of protection, making it much harder for cybercriminals to break into your accounts. Be sure to enable MFA on important accounts, especially email and financial services.

    Ready to set up MFA? Here’s a step-by-step guide to get you started.

    1. Update Software Regularly

    Software updates can feel like a hassle, but they’re essential for protecting your devices. These updates patch security vulnerabilities and help guard against the latest threats. Make it a habit to check for updates regularly, or better yet, set them to update automatically.

    Why updates matter? Learn more at StaySafeOnline.

    Building a Safer Digital World Together

    By adopting these simple yet powerful practices, you can contribute to a safer online community. Cybersecurity is a shared responsibility—talk to your family, friends, and colleagues about these steps to create a more secure digital space for everyone.

    Take the Next Step: Pursue a Cybersecurity Career

    If the world of cybersecurity intrigues you, why not take it to the next level? The University of Advancing Technology (UAT) offers a suite of innovative cybersecurity degrees designed to equip you with the skills to tackle modern digital challenges.

    With online and on-campus options, UAT’s programs offer flexibility to fit your schedule. UAT is designated as a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA), giving you access to real-world, hands-on learning experiences.

    Ready to Become a Digital Defender?

     

    Take the first step toward a cybersecurity career. Request information or apply today — it's quick, easy, and there’s no application fee. 

    Together, we can build a safer digital future. Start your journey at UAT today!

     

    {% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True, viral_sharing=False, embed_button=False, autoplay=False, hidden_controls=False, loop=False, muted=False, full_width=False, width='300', height='270', player_id='178828555668', style='' %}

     

    read more
    less

    The Current State of Cybersecurity - Fall 2024


    Has the cyber landscape changed in the last five years? Yes and no. Let's discuss. While Artificial Intelligence (AI) technology isn't new, its widespread adoption through readily available...

    Has the cyber landscape changed in the last five years? Yes and no. Let's discuss.

    While Artificial Intelligence (AI) technology isn't new, its widespread adoption through readily available Large Language Models (LLMs) such as ChatGPT and Gemini has streamlined both the learning and application of cyber threats across the entire spectrum of cyber-based technologies. Despite efforts by AI model authors to curtail explicit guidance for criminal activity, creative solutions through prompt engineering and home-grown models enable users to fast-track the development and use of exploits, especially zero-day vulnerabilities, at an increasing and alarming rate.

    Ransomware as a cyber tool used to exploit individuals and high-value targets alike, has seen significant growth in the last five years. While not new (recall the WannaCry attack in 2017), ransomware is now more sophisticated and easier to use through exploit kits and Ransomware-as-a-Service (RaaS) offerings, further enabling cyber as a force for harm. Recent statistics show a half a billion ransomware attacks detected in 2022 alone, with the average ransom payment rising to $1.85 million in 2023 (Varonis, 2024).  Additional sources cite 72.7% of all organizations globally fell victim to a ransomware attack in 2023 (Cobalt, 2023).

    Although the COVID-19 pandemic appears to be in the rearview mirror, we continue to cite it as a force of change in all facets of life. The landscape of cybersecurity is no exception. As many organizations shifted to remote work, disrupting remote-enabling technologies became a focal point for exploitation. The expansion of these techniques is expected to continue despite the growing trend to return workers to the office. In fact, a recent study illustrated on average a cyber attack occurring every 32 seconds throughout 2023 (Cobalt, 2023) with remote work being a significant contribution to the vulnerabilities exploited.

    Larger and more frequent data leaks seem to be largely desensitizing the public to the loss of personal sensitive information. In many ways, we appear to be moving from "trust but verify" to "zero trust" to "zero privacy". Regulations such as General Data Protection Regulation (GDPR) enforced by the European Union have largely improved data security requirements for our European counterparts and those conducting business overseas, but the US continues to lag in setting similar standards stateside. However, the proposed American Data Privacy and Protection Act (ADPPA) shows promise in addressing this gap.

     

    1123_SOC-Bunce9

    Each of these examples highlights the evolution of cyber exploitation, and it's certainly notable that security researchers are equally at task in identifying solutions. Nations are developing coalitions to cooperatively combat cybercrime. But at the heart of today's cyber landscape are nation-state endorsed cyber threats.

    In a war that has largely become an afterthought for many Americans, the future of cyberwarfare is playing out in real time. As common as missiles and bullets, attacks on cyber infrastructure in Russia and Ukraine are laying the foundation for expectations in war for years to come. The NotPetya attack of 2017, initially targeting Ukraine but spreading globally, serves as a stark reminder of the potential collateral damage in cyber conflicts.

    While supply chain attacks have been a technique for exploiting enemy weaknesses nearly as long as war itself, Israel's leverage of this ancient technique to implant devices with explosives and coordinate remote detonation is strikingly impressive and alarming in the same breath. This demonstrates the evolving intersection of physical and cyber warfare.

    In the age of technology, evolution isn't an expectation; it's directly woven into the fabric of all things. The nature of cybersecurity and exploitation, and the principles that drive security at large, have changed very little over the last five years (or twenty, for that matter). However, the speed, scope, and delivery of threats and security responses drive the constant shift of the cyber landscape we can expect to see for the foreseeable future. 

    Looking ahead, emerging technologies like quantum computing pose both new threats (potentially breaking current encryption methods) and opportunities (quantum-resistant cryptography) for cybersecurity. Additionally, the growing Internet of Things (IoT) ecosystem continues to expand the attack surface, necessitating new approaches to security in an increasingly connected world.

    Want to learn more? Check out UAT's suite of Cyber security degrees here.

    References

    Varonis. 2024. Ransomware statistics, data, trends, and facts [updated for 2024]. https://www.varonis.com/blog/ransomware-statistics

    Cobalt. 2023. Top Cybersecurity Statistics for 2024.  https://www.cobalt.io/blog/cybersecurity-statistics-2024

    read more
    less

    UAT Kicks Off Cyber Security Awareness Month with Insightful Panel


    University of Advancing Technology hosts information protection panel with industry leaders to discuss the latest trends in cyber security Cyber Security Awareness Month On October 2nd, the University of Advancing Technology...

    University of Advancing Technology hosts information protection panel with industry leaders to discuss the latest trends in cyber security

    Cyber Security Awareness Month

    On October 2nd, the University of Advancing Technology (UAT) launched its Cyber Week in celebration of Cyber Security Awareness Month with an engaging panel discussion moderated by Robert Walker, UAT’s Director of Community Initiatives. The panel featured a diverse group of experts and students, each contributing valuable insights on the state of cybersecurity.

    Meet the Panelists

    • Dara Gibson, President of InfraGard Arizona, emphasized the critical role of industry connections in securing essential infrastructure.
    • Dr. Briant Becote, UAT Professor and Navy veteran, brought international experience in cybersecurity from his time serving as Director of International Affairs in Egypt and Qatar.
    • Aaron Rodriguez, UAT Cyber Security Professor and 11-year Air Force veteran, shared his deep expertise in technology and security solutions.
    • Christopher Alsay, a UAT undergraduate Network Security student, and Kyle Suttie, a former Game Design student now Cyber Security Graduate student, offered a fresh perspective from their hands-on experiences at UAT.

    078A5524

    Exploring the Cyber Threat Landscape

    The conversation opened with a focus on the most pressing cybersecurity threats facing organizations today. Dara Gibson stressed the importance of education and training, noting that no matter the sector, robust training and network segmentation are essential to building strong defenses. Dr. Becote added a thorough explanation of zero trust security and why it is so crucial that users take dominion over their data, from auditing what emails come in their inbox, to reviewing their credit report regularly for abnormal activity.  

    The panel explored how industries can work together to enhance cybersecurity, highlighting how technology’s rapid evolution demands cooperation. Artificial intelligence (AI) was a major talking point, with the group discussing how both attackers and defenders are leveraging AI to gain the upper hand. While AI offers powerful defense capabilities, ethical concerns surrounding its use in cyberattacks remain a crucial consideration.

    Cyber Security Passion

    Shaping the Future with Practical Education

    The discussion concluded with a look at how UAT is preparing the next generation of cybersecurity professionals. Unlike traditional approaches that rely heavily on theory, Christopher and Kyle asserted that as a UAT student, they learn through practical, hands-on applications, equipping them to meet the growing demands of the cybersecurity landscape. Professor Rodriguez corroborated these claims noting that and listing the items he teaches in his course from ethical hacking to offensive penetration testing.

    This panel provided an excellent kickoff to UAT’s Cyber Week, sparking important conversations about the future of cybersecurity and the role education plays in shaping it

    To learn more about you can secure your cyber security future, visit University of Advancing Technology.

    read more
    less

    Revisiting Innovations with H@xc0rd


    From the University of Advancing Technology’s (UAT) humble beginnings in the 1980s to its present-day status as an innovation hub, many Student Innovation Project (SIP) concepts have been hatched and brought to fruition here. Some SIPs continue to be developed after graduation, exemplifying the spirit of creativity and...

    From the University of Advancing Technology’s (UAT) humble beginnings in the 1980s to its present-day status as an innovation hub, many Student Innovation Project (SIP) concepts have been hatched and brought to fruition here. Some SIPs continue to be developed after graduation, exemplifying the spirit of creativity and technological advancement that defines UAT. Other SIPs prove to be the perfect launching pad to propel the student into their future careers—which was certainly the case for Bradley Chavis, a 2021 dual-major graduate of the Advancing Computer Science and Network Technology (now offered as Network Security) programs.

    Bradley’s SIP, H@xc0rd, was a simple yet powerful Discord bot designed for utilizing common network security tools without requiring any knowledge of Linux.

    H@xc0rd's tools ranged from exploitation to reconnaissance, including Hashcat, Hydra, Nmap, Shodan, and many more. Each tool had its own custom-built help section to guide users on understanding what the tool was, how to use it, and how to interpret the results. Since many tools within the project could be intrusive to the local network it was hosted on, the bot owner could adjust who had access to which tool at any time, significantly limiting the chance of misuse.

    Using H@xc0rd on the server it was hosted on was even simpler, as only a Discord account and basic knowledge of the platform would be needed. To use the bot, one simply had to use the specified prefix found in the packaged sub.js file and the command they wanted to run. For example, a “!ping” command would provide the bot's latency.

    Users could crack a password hash with Java Ripper and showcase the results to everyone on the server without needing to export and share files repeatedly. Additionally, they could find out how many times a particular password had been compromised using the “!haveibeenpwned” command, which queried the Have I Been Pwned database and displayed the results.

    To see all available commands, users could simply use the “!commands” function, which listed approximately 15 tools implemented in the project. Bradley Chavis and his project partner, David Austad (Network Security alum), consistently updated the tools within the project, removing and replacing them as necessary to ensure relevance.

    If a tool wasn’t implemented but was desired, users had the freedom to add it themselves. H@xc0rd was built to allow new tools to be implemented in a matter of minutes.

    One significant challenge during the project was making H@xc0rd run on systems other than Linux. Initially, it only ran on Linux, which conflicted with the goal of universal accessibility. The solution was Docker, a virtualization platform that allows Linux environments to run on systems that wouldn’t typically support them, such as Windows or Mac OS. Docker’s implementation enabled H@xc0rd to be hosted on nearly any operating system, with an install script to handle any issues.

    The project aimed to be as user-friendly as possible, with install scripts automating the setup process on most Linux systems. This ease of setup ensured that anyone could start using H@xc0rd quickly and efficiently.

    “You will never be limited with what you can do with this project, only by your imagination,” Bradley said back in 2021 of the project.

    Through H@xc0rd, Bradley brought advanced network security tools to users' fingertips with ease and accessibility, revolutionizing how these tools could be used on Discord.

    And even more than that, Bradley learned so much in the production of his SIP that he was able to gain a coveted network security job after graduating from UAT in 2021.

    Leveraging a security intern position at Netskope that he completed during his time as a college student, Bradley started a new position as a compliance analyst for the company directly after graduation. He has remained at Netskope since then and has already received two promotions in that time. Today, Bradley is a Security Analyst II for Netskope and is nearing his four-year mark with the company. His success demonstrates what can be achieved with a UAT education!

    Embark on Your Academic Adventure at UAT

    Did this student’s story ignite your interest in UAT? Now is the ideal time to inquire further or even apply for admission! Whatever stage you are at in your academic journey, UAT’s approachable Admissions and Financial Aid teams are ready to provide support and assistance. Step into your future by connecting with us today

    read more
    less

    Enforcing a New Standard for Security


    A Network Security and Technology Forensics dual-major, Christopher Perme was lucky to have a Student Innovation Project (SIP)...

    A Network Security and Technology Forensics dual-major, Christopher Perme was lucky to have a Student Innovation Project (SIP) idea spark from his personal circumstances.

    What was less lucky? That inspiration arrived with a dilemma: After ordering a custom-built PC worth thousands of dollars, Chris was devastated to see his desktop arrive in Arizona in an absolutely demolished state. Having clearly been dropped at some point enroute, the water-cooled case broke and the liquid within destroyed all components of the PC. Chris realized there was a need for a more secure and protective way to ship expensive electronic devices, which inspired him to develop Enforcer, a new shipping solution that ensures security of high-value hardware in transit.

    Equipped with a Raspberry Pi 4, a micro 128GB SD card, an O-ring, and an automatic pressure release valve, the Enforcer is an impressively designed shipping container. Material within the Enforcer is protected from the elements with its airtight seal and thermal resilience. Additionally, opening the Enforcer trips a magnetic switch which triggers video surveillance from within the case. This makes the Enforcer ideal for transit of precious goods, as the user can view footage from the shipping container and investigate any foul play later with video surveillance.

    Enforcer-Inbody-1Chris initially intended the Enforcer for desktop computers. However, as he worked on it and explored various storage methods, he realized the case could securely ship any item while providing security footage.

    Chris has come a long way from his hometown of Garettsville, Ohio to UAT’s Tempe campus. It proved a fortuitous move, though, as Chris finds the campus to be the perfect backdrop for aspiring innovators.

    “For starters, any resource that you could possibly imagine—it's here,” Chris explained. “All on-campus technology is updated regularly, whether it's a VR machine, or a 3D printer, or some form of network security software. It's all provided for students to get to experiment with new technology without breaking the bank.”

    Chris chose to transfer to UAT after an injury ended his football career at Marietta College in Ohio. Wanting to switch his focus from athletics to academics, he applied to UAT on the advice of some family members who are also UAT alumni. Semesters later and now well settled in, the community at UAT has proved invaluable to Chris almost as much as the resources.

    “Here at UAT, if you ever need a helping hand, you can walk in the hallway, say, ‘Hey, I might need help later with something,’ and chances are that they're going to reach out to you before you reach out to them,” Chris said. “There's always somebody willing to help whether they’re a professor or a student. And that's something that's really hard to come by—especially nowadays.”

    Chris collaborated with James “Glenn” Truett, a Digital Maker and Fabrication and Robotics and Embedded Systems dual-major at UAT. Glenn contributed to more of the physical elements of Enforcer, such as developing schematics and assisting with 3D printing, soldering, and wiring needs for the project. UAT faculty were also helpful, with Chris being particularly grateful to Professor Dapzury Valenzuela, who oversees the SIP-related courses.

    Enforcer-Inbody-2In just a few more semesters, Chris will graduate with his degrees, and plans to then return to Ohio. He says he’s eager to find an entry level network security position to get his start at a company where he can use his knowledge and skills to excel. Or, with the demand for network security and technology forensics majors, perhaps land a role he can “grow into” with mentorship and on-the-job learning. He’s keeping an open mind to possibilities but feels confident that the skills he’s learned at UAT will help him wherever he goes as long as he embraces opportunities for continuous learning.

    “You learn something new with every job you're at, regardless of if you like it or not,” he said. “Every experience is a learning opportunity.”

    Embark on Your Academic Adventure at UAT

    Did this student’s story ignite your interest in UAT? Now is the ideal time to inquire further or even apply for admission! Whatever stage you are at in your academic journey, UAT’s approachable Admissions and Financial Aid teams are ready to provide support and assistance. Step into your future by connecting with us today.

    read more
    less

    Inside the UAT Production Studio Experience: Where Ideas Become Industry-Ready Projects


    What is UAT Production Studios?  University of Advancing Technology (UAT) offers a unique differentiator for its students called Production Studios, a class designed to create a real world, industry project experience....

    What is UAT Production Studios? 

    University of Advancing Technology (UAT) offers a unique differentiator for its students called Production Studios, a class designed to create a real world, industry project experience.

    "The UAT Production Studio course allows students to learn and apply the steps, practices, and processes linked to technology project creation. Through the class, students take on the roles and procedures of teams working in production pipelines that mirror the workplace,” says Derric Clark.

    Clark is UAT's Game Studies Program Chair and has been an integral part of UAT Production Studio since its conception and has significantly influenced its evolution to where it is today. Clark currently runs the curriculum and class for Production Studios for all UAT students. 

    T. Lynn Understiller, UAT Professor for the Game Art and Animation and the graduate courses for the Game Production and Management master's degree, was also an integral pioneer for UAT Production Studios, launching it as UAT Game Studios in 2011 and offered to only game studies majors at the time.

    Understiller stated, “UAT’s Production Studios has led students through the job process beginning each semester with the Game Job Fair where students are recruited onto Greenlighted team projects and take on owning and managing their teams on their own while working with professional outside stakeholders. UAT Studios has become one of the University’s greatest assets and has been adopted by all programs of study.” 

    0623_ProductionStudios_Murphy

    Fostering Innovation from Students and Industry  

    Following each semester’s Student Awards Ceremony, an event called ‘Greenlight’ takes place where students and external industry clients can pitch projects to become teams for the following semester’s Production Studios class. Projects can be in any stage of development, from idea to fully functioning business, such as Grab The Axe and FABRIC.

    For Greenlight, any UAT students have the opportunity to pitch and manage their projects, as well as engage with external projects involving real clients and diverse personalities. They often are able to have a graduate student on their team to help with project management, or interact with alumni who contribute to the studio enhances networking opportunities. Additionally, the class mimics an incubator for launching companies, empowering students to hire interns and further contribute to the industry. Overall, Production Studios not only inspires students but also serves as a technology nexus connecting various UAT classes, enriching the educational experience and culture for all students.

    UAT Production Studio

    What to Expect in the UAT Production Studios Courses

    The Production Studios class at UAT offers a comprehensive array of benefits for students. Through this course, students not only create high-quality completed works but also develop expertise in production and discipline. By collaborating with teams, they witness the fruition of a collective vision, gaining valuable experience in team leadership and mentorship. The class experience facilitates collaboration between online and on-ground students, fostering a dynamic learning environment. Moreover, students are immersed in real-world industry expectations, honing both soft and hard skills essential for success. 

    Students are required to take at least two sessions or semesters of Production Studio and in each, they work toward the creation of market-ready, professional applications of technology. This class typically is part of a UAT student’s curriculum in the final four semesters, alongside Student Innovation Project (SIP), Internship, Boards and Portfolio courses. All classes combined pull together the culmination of a student’s unique accolades and achievements, readying them to be able to present and articulate their skills to the world. 

    UAT Production Studio

    Major components and priorities of the UAT Production Studios course include: working together as a team to accomplish completed works, creating opportunities for students to demonstrate mastery for their chosen fields, have industry-relevant projects Portfolio Works to showcase to the industry and prospective employers, as well as create innovative projects for the industry that solve real-world problems. 

    Course objectives for UAT Production Studios includes: 

    •    Collaborate with all team members to develop a project and progress it to the next major milestone. 
    •    Design and implementation of all necessary features, functions, and assets. 
    •    Develop cross-disciplinary and leadership skills using industry-standard management systems and tools, team, and project management techniques which includes interfacing with external QA teams, and creating supporting documentation that provides detailed specifications of all features and content, as well as a record of the project’s development.
    •    Project’s progress is presented at the end of the semester.

    UAT Production Studio

    The UAT Production Studio Experience According to Students

    Alexis Sloan, UAT Network Security Alum and Brooke Cayce Scholarship award winner ran her Student Innovation Project (SIP), STEM For Kiddos, for 3 semesters through Production Studios during her undergraduate time at UAT.

    I enjoy the hands on experience we are able to get in the class no matter what your major is you’re going to get something out of it. I think with the leadership aspect of being in the class, I have learned a lot from how to manage a team, delegate tasks among others, and overall time management skills. Everyone will say communication is the number one thing to have but I also think that the organization through the project is also a major role. It has helped me find ways I work better with a team and how to grow within a team,” says Sloan. 

    Sloan is continuing her education with a Master of Science in Technology Leadership at UAT. She hopes to continue running her project through Production Studios to provide a great opportunity for the UAT undergraduate students to work on a matured, vibrant, and fun student project. 

    0823_SIP-Alexis Sloan-8

    Echoing Sloan's sentiments, Stace Dixon, a UAT Digital Marketing degree alum who ran her SIP, the GENkids app through Production Studios in the Fall semester stated, “Production Studios is comparable to and works parallel to UAT’s Internship experience. Students are getting exposure to what it's like to work in the real world, facing the same challenges organizations deal with every day. I've also seen student projects launch careers if they continue pursuing it after Studios, like Escape Room AR. Production Studios is a unique, foundational, and transformative experience for UAT students to sharpen their career readiness and leadership skills, readying them for the challenges they will face in their future careers." 

    Discover more about Production Studios and other unique and cool courses in UAT’s Course Catalog.

    If you’re ready to take the next step toward a degree and Tech Respect, apply today or schedule a meeting with your Academic Advisor to begin your enrollment process. 

    read more
    less

    The Integration of Drones into Cyber Security Strategies


    You may be surprised, but drones are playing a pivotal role in enhancing network security in several innovative ways. As technology evolves, the integration of drones into cybersecurity strategies has opened new...

    You may be surprised, but drones are playing a pivotal role in enhancing network security in several innovative ways. As technology evolves, the integration of drones into cybersecurity strategies has opened new avenues for protecting digital infrastructure.

    1. Advanced Surveillance and Monitoring: Drones are equipped with high-resolution cameras and other sensors that allow for detailed surveillance of large and remote areas. This capability is particularly useful for monitoring the physical security of network infrastructure like data centers, communication towers, and cable routes. By providing real-time visuals and data, drones help in early detection of physical breaches or tampering that could lead to network vulnerabilities.

    2. Aerial Assessment of Wireless Networks: Drones can be used to assess the security of wireless networks. Equipped with the right tools, they can identify unsecured Wi-Fi networks, detect unauthorized access points, and analyze signal strengths and vulnerabilities. This bird’s-eye view approach enables a comprehensive assessment of network security, which is often challenging to achieve from the ground.

    3. Inspection of Hard-to-Reach Infrastructure: Many components of network infrastructure, such as antennas and satellite dishes, are located in difficult-to-reach areas. Drones can easily access these spots to inspect for physical damages or unauthorized devices that could compromise network security.

    4. Rapid Deployment in Incident Response: In the event of a suspected network security breach, drones can be quickly deployed to the affected site. They provide immediate visual feeds and data analysis, allowing for a quicker response and assessment of the situation.

    5. Testing Network Resilience: Drones can simulate potential security threats to a network, helping organizations test their defenses and response protocols. By mimicking attacks like denial-of-service (DoS) from various locations and altitudes, drones help in strengthening network security measures.

    6. Data Encryption and Secure Transmission: When it comes to handling sensitive data, drones equipped with secure communication links and strong encryption protocols ensure that the data they collect and transmit is protected against interception and cyber threats.

    Drones offer a unique and versatile approach to network security, extending the reach of traditional cybersecurity measures. Their ability to provide aerial insights, rapid response, and innovative testing capabilities make them an invaluable asset in the ongoing battle against network security threats.

    read more
    less

    Defending Against Blacklotus: UAT's Cyber Security Program Sheds Light on UEFI Attacks


    The Blacklotus malware is a UEFI bootkit that targets systems at one of their earliest points of availability. During the boot process. ESET malware researcher Martin Smolár noted that this begins with executing an installer that deploys the bootkit files to the EFI system partition, disables the HVCI and BitLocker protections, and reboots the host....
    The Blacklotus malware is a UEFI bootkit that targets systems at one of their earliest points of availability. During the boot process. ESET malware researcher Martin Smolár noted that this begins with executing an installer that deploys the bootkit files to the EFI system partition, disables the HVCI and BitLocker protections, and reboots the host. Legitimate binaries vulnerable to CVE-2022-21894 (Windows Hypervisor Loader, Windows Boot Manager, PE binaries) and their custom Boot Configuration Data (BCD) are then exploited and persistence on machines with UEFI Secure Boot enabled is achieved after the initial reboot by exploiting CVE-2022-21894 and installing the attacker’s Machine Owner Key (MOK). A self-signed UEFI bootkit is launched after reboot and the malicious kernel driver and an HTTP downloader are deployed. This will allow the attacker to complete the installation of the attack.
     
    This is particularly devastating because most users are unfamiliar with the boot process, UEFI, and most of the underlying software and firmware that the system uses to support operations. This means that attackers are going to target the computer in places where the average user is neither going to know how to fix nor even identify the vulnerability. Most users are unaware of how much computing power exists below Ring 0 and lives tucked away from the user space, and this is exploited by more technically savvy attackers.
     
    However, individuals enrolled in our cyber security program at UAT are exposed to UEFI, boot loaders, and even systems like Minix which are used at the heart of many computers today. By being exposed to these tools early on in their development as cyber security students, they are able to identify or defend against some of these attacks. The most important aspect being the identification of and ability to respond to these types of issues.
     
    __________________________________________________
     
     
    Professor Jones is the lead Cyber Instructor at the University of Advancing Technology and is a software developer who currently creates applications for law enforcement. He is also an AZ Peace Officer Standards and Training certified General Instructor as well as a public speaker. He earned a BS, in Computer Information Systems from Park University in 2013 and an MA, in Intelligence Analysis with a focus in Cyber Security in 2014. Professor Jones has been the recipient of recognition from the El Paso Police Department, State Of Texas, Texas Military Forces, Chandler Police Department, and others.

    Professor Jones is also active in the community as the founder of the Phoenix Linux Users Group Cyber Security Meetup and regularly teaches members of the public a myriad of topics related to Cyber Security. His audience includes students, teachers, law enforcement, military, government officials, and concerned members of the public with a strong desire to learn what is going on in the world of technology.
     
     
    read more
    less

    What is Kali Linux?


    Kali Linux, formerly Backtrack Linux, is a Debian-based and open-source operating system distribution with the intention of making penetration test and auditing tools available to the average user. Kali Linux can be installed or otherwise booted up with hundreds of tools preinstalled to make tasks such as forensics and reverse engineering much more accessible to...

    Kali Linux, formerly Backtrack Linux, is a Debian-based and open-source operating system distribution with the intention of making penetration test and auditing tools available to the average user. Kali Linux can be installed or otherwise booted up with hundreds of tools preinstalled to make tasks such as forensics and reverse engineering much more accessible to less technical users.

    Kali is completely free, has an open-source Git tree available, is Filesystem Hierarchy Standard compliant, and supports a wide range of hardware. You can install Kali locally onto hardware or run it from a USB drive as a live distribution and it will typically be highly compatible with numerous additional devices.

     kali linux

    Kali can be used to conduct penetration testing, security auditing, digital forensics, or reverse engineering. The applications installed come from a minimal set of repositories and the goal is to keep upstream software sources to a minimum. The intention being that users can deploy Kali quickly and easily into an environment and get to work with minimal fuss or the need for additional training.

    Remember that Kali was not designed to be a daily driver and installing any unapproved applications is not support. While Kali can potentially make your life easier, it is certainly not designed to be an everyday OS. You will not be able to install games or other out of band software without many issues or problems. Kali fills a very specific niche but if you have need of a system to accomplish your goals, it may do those things very well.


    Earn a Degree in Cyber Security at UAT

    UAT offers a Master’s of Science in Cyber Security, as well as bachelor’s degrees in Network EngineeringNetwork Security, and Technology Forensics. Our Cyber Security Degree for Ethical Hackers and Network Security Curriculum has been certified through the NSA/DHS National Information Assurance Training Program in Information Assurance and Cyber Defense.

    Designated as a Center of Academic Excellence by the National Centers of Information Assurance Education (CAE/IAE), UAT’s Network Security Bachelor’s of Science degree prepares students to take on the ever-evolving world of information security.

    If you believe a career in cyber security may be right for you, request information about our degree programs. At the University of Advancing Technology, we’re passionate about helping students enter STEM fields and acquire the skills they need to land a rewarding career in cyber security and beyond.

    read more
    less

    Running Your Own Email Server


    What is MIAB? Running your own email service provider sounds like a daunting task but it can be made easier by using an array of tools that have been combined into a self-hosted service called "Mail in a box" (MIAB). MIAB turns a fresh cloud computer into a functional mail server,...

    What is MIAB?

    Running your own email service provider sounds like a daunting task but it can be made easier by using an array of tools that have been combined into a self-hosted service called "Mail in a box" (MIAB). MIAB turns a fresh cloud computer into a functional mail server, and you do not need to be a technology expert when setting it up.

    MIAB will assist you in setting up both webmail as well as an IMAP/SMTP server for use with mobile devices and mail software that runs on the desktop. You can also manage your contacts and synchronize your calendar. You get the standard functionality like spam protection, mail filtering, email client auto-configuration, and you can even back it all up to Amazon S3. If you allow MIAB to function as your DNS server you will get access to automatic SPF, DKIM, DMARC, and MTA-STS security.

    email server 2

    MIAB runs awesome on Amazon EC2 instances and by combining the knowledge of the cloud with some basic capabilities to run bash scripts, you can get online very quickly. You will need a domain name and a server, and those costs can be kept very inexpensive by using an affordable provider such as AWS.

    Whether you are concerned about mass electronic surveillance or want to contribute to the decentralization of the web, it is possible that a tool like mail in a box could provide you with the simplified tools you need to accomplish your goals. For more information about this topic, check out these resources: https://mailinabox.email/ and https://sealedabstract.com/code/nsa-proof-your-e-mail-in-2-hours/ .

    SECURE YOUR FUTURE WITH A CYBER SECURITY DEGREE

    UAT offers a variety of degree choices, from associate to master degree options. Don't wait. Apply now!

    Explore UAT's cyber security degrees: 

    read more
    less

    What is a Password Manager?


    Forgot Password? A password manager is a tool that is designed to manage many passwords in a secure and easy to access manner. Using a single password for all your accounts increases the likelihood that you will be breached over many accounts by a large percentage. It is important...

    Forgot Password?

    A password manager is a tool that is designed to manage many passwords in a secure and easy to access manner. Using a single password for all your accounts increases the likelihood that you will be breached over many accounts by a large percentage. It is important that you use a strong password that is not easily guessed on each account, and this is best facilitated not by trying to remember your passwords but instead by deploying the technology necessary to make this a trivial exercise.

    Google Online Security Survey found that 52 percent of all the individuals who responded to them reused the same password for more than one account. That means, if you provide this password to a company that is breached, you can now expect that password to be included in brute force lists and eventually to be used to break into your accounts. Reducing the likelihood that a compromised, weak, or reused password will be used against you starts with the use of a password manager.

    Password Body

    You have many choices when it comes to password managers. You can deploy something self-hosted or use a password manager provided by a company. While we do not recommend any password manager, we will mention that SAASPASS, an application available over several devices provides the ability to store passwords as well as manage One Time Password tokens, tremendously reducing complexity. Finding something that meets your needs, is easy to use, and secure can be difficult but the features provided by any password manager are typically parallel and only the service and support of the company as well as price will typically differ.

    By using a password manager, you will no longer need to memorize all your passwords. You can automatically generate a secure password using built in tools. You can also leave your master password in your personal documentation in the event of your death to facilitate your digital inheritance. All these benefits make your life easier, more secure, and safer.

    Even if you do use a password manager, do not forget to use a complex and original password per account, enable two factor authentication, and think about how you will recover accounts in the event you lose a device. Your security begins with practicing best practices related to cyber security.

     


    SECURE YOUR FUTURE WITH A CYBER SECURITY DEGREE

    UAT offers a variety of degree choices, from associate to master degree options. Review the programs available here. Don't wait. Apply now!

    SOC

    read more
    less

    UAT Retires Cyber Warfare Range, Introduces SOC


    UAT Adds Security Operation Center After more than 10 years, University of Advancing Technology (UAT) retired its Cyber Warfare Range and in August 2021, added its own Security Operations Center (SOC), where students can work alongside mentors...

    UAT Adds Security Operation Center

    After more than 10 years, University of Advancing Technology (UAT) retired its Cyber Warfare Range and in August 2021, added its own Security Operations Center (SOC), where students can work alongside mentors to learn how to manage SOCs for virtually any organization. Security Operations Centers are important for any organization looking to decrease cyber threats and attacks. It is a central hub in charge of predicting, assessing, and taking action against cyber threats, as well as working to prevent them altogether. This center is available to all students, but it is most pertinent to Network Security, Cyber Security, Network Engineering and Technology Forensics majors.

    What is a SOC and Why Do We Need One?

    Security Operations Centers are 24-hour security hubs that work to increase the level of cyber security within an organization. Security engineers and analysts work in SOCs around the clock to analyze, prevent, and ultimately stop cyber attacks. Cybercriminals will attack at any time of day, which makes these centers so important to an organization's cyber security.

    SOCs are essential to every organization, UAT being no exception. The benefit of having a SOC at the university is that students can get hands-on experience and training in a place not unlike one they could work in after graduation. Students with an interest in Cyber and Network Security get the opportunity to assess and address cyber threats in real-time. Working at UATs SOC can make your resume stand out amongst other college graduates who weren’t afforded the same opportunities. At UAT, we believe everyone should get the experience they need before they even graduate.

    The main feature of the SOC is the ability to connect to UAT's virtual machine cluster. This gives student the ability to interact with any operating system as long as they have the have the ISO file for it. Another benefit of the virtual machine is the ability to restore the state of the virtual computer once you take a snapshot. For example, students can run malware on a virtual machine and observe it. Then when they're done, they can examine the damage and can revert it. They are able to go back to the stage before the malware had been run. Cyber Security Associate Professor Jeremy Bunce adds, "Templates of virtual machines can be made, allowing me as an instructor, to create 15 Windows computers for my students to use in a class. Or have a virtual machine with misconfigurations that the students could get hands on practice fixing."

    UAT_Network_Security_SOC

    What Happens in a SOC?

    The functions and occupations of a security operations center can be boiled down to five major tasks: monitoring, response, remediation, consistency, and context. 

    1. Monitoring is tracking of cyber threats or potential threats. 
    2. Response is reacting to, and fixing said cyber threats and attacks. 
    3. Remediation is assessing current security operations and finding weak points. 
    4. Consistency is maintaining a security operation and abiding by it in an ethical way.
    5. Context is determining specific functions and needs of an organization that a SOC team can fulfill.

    Professor Bunce explains, "The SOC is used by student to do their homework so they can practice hacking without risking their own computer." He adds, "The SOC is typically not used by non cyber students since it normally requires them to take a network security class to gain a login. Faculty can use the SOC to set up virtual machine to either demonstrate an exploit or set up a lab for them to work on."

    "We have hosted Cyber Patriots here in the SOC," Bunce shares about community involvement in the SOC. "It’s a network security competition for high school students where they compete against other schools. They use our room for both doing the competition and hosting their training in the SOC." 

    There are also events held in the SOC, such as Capture the Flag and Red v. Blue. If you are new to cyber security, these are competitions held for students that give them hands-on experience in real world settings. Bunce explains what Capture the Flag is, "You are given a task and need to complete it which results in you getting a file that is called a flag. Some examples of task are decrypting a text to get the original text or using a computer exploit to gain access to it and downloading a file called flag.txt." Students take part in these to not only learn the skills, but to be able to preform under pressure.

    There are many benefits to having a SOC, but one of the most important benefits is the students having access to a setup like this. As mentioned before, the SOC replicates SOCs they will encounter in the real world, assuring they are prepared once they graduate. Students can make virtual machines that meet an industry standard SOC. This allows the students hands-on practice and the ability to revert changes if they make a mistake. "Another aspect of our virtual machine cluster is that each class has a private network. This allows an installing windows server class and an ethical hacking class at the same time without them interfering with each other. This also allows for Capture the Flag competitions to be run on the virtual machine cluster. There is also the added benefit of having a room dedicated to network security for students to set up collaboration or work on projects together," shares Bunce. Along with the hands-on learning experience, students have access to a PowerEdge T340. If you aren't familiar with what it is, it is a mini server with two monitors.

    UAT_Jeremy_Bunce_CTF

    How Can I Get Involved?

    Contact an advisor or a professor for more information on getting involved with the SOC. Working at the SOC can be a great way to build your resume and gain workplace experience. UAT is excited about this recent addition to the campus and encourages students to look into it.  Become a part of the solution today and get hands-on experience dealing with real cyber threats and attacks and maintaining security procedures.

    read more
    less

    Tim Roemer Presents The Five Cs of Cybersecurity to UAT Students & Community


    Technology is the life force of University of Advancing Technology (UAT). Fostering technology discussions and exploring the edge of innovation are what UAT does best. In spirit of advancing technology, UAT constantly invites guest speakers to...

    Technology is the life force of University of Advancing Technology (UAT). Fostering technology discussions and exploring the edge of innovation are what UAT does best. In spirit of advancing technology, UAT constantly invites guest speakers to visit campus to impart wisdom, facilitate discussion and provide networking opportunities and community connections with students.

    Tim Roemer, a 2022 UAT Honorary Doctorate recipient, visited campus to speak with students about the State of Arizona's Five Cs of Cybersecurity. The five Cs include culture, communication, collaboration, conviction and consistency. Before presenting to all of UAT and the community, he held a private luncheon for cyber security students, allowing them to dive deep into their cybersecurity questions.

    “I can tell you from real world experience that, unfortunately, there are still myths out there at senior levels of government and law enforcement about cybersecurity. People still throw the term cybersecurity out when they just mean general technology. But we’re going to take it because it gives us momentum.”

    Tim Roemer was appointed by former Governor Ducey in April of 2021 as the Director of the Arizona Department of Homeland Security. Director Roemer advised the Governor on a wide range of topics including cybersecurity, border security and counterterrorism.

    Director Roemer also manages cybersecurity for the State of Arizona as the State’s Chief Information Security Officer (CISO). As State CISO, Director Roemer leads the State’s cybersecurity team, sets cybersecurity strategy and defends the State against evolving cyber attacks that threaten citizens' data and Arizona’s critical infrastructure. Through consistent vigilance of culture, communication, collaboration, conviction and consistency, Director Roemer will help Arizona improve cybersecurity resiliency.

    “My team has regularly scheduled calls with technology leaders in the State to update them on what to be on the lookout for and what we are blocking at a state level. For the longest time, one of the biggest things criminals were utilizing in phishing emails were COVID heat maps, so it was like 'click here for a heat map of COVID cases in your community' and that's how they were getting a lot of government employees to click on the phishing emails.”

    Director Roemer’s career is quite impressive. He has served the State of Arizona in a variety of leadership roles prior to his current appointment. This includes four years in a dual role as the Governor’s Public Safety Advisor and Deputy Director of the Arizona Department of Homeland Security, one year as the Governor’s Deputy Director of Legislative Affairs and two years as the State’s CISO. Director Roemer has served on numerous Boards and Commissions including the Arizona-Mexico Commission’s Security Committee and the Human Trafficking Council since the beginning of former Governor Ducey’s Administration in 2015.

    "Recently, the human trafficking counsel has been asking my team for some help because my team is naturally very good online They're better than most criminal investigators, they can find things out a lot faster. They can write rules for things and consolidate information a lot faster."

    Director Roemer served in the Central Intelligence Agency for 10 years before working for the State of Arizona. The final two years of his CIA career were spent assigned to the White House Situation Room, where he provided critical national security updates to the President, Vice President and National Security Council. In this role, he was responsible for briefing senior U.S. policymakers on a broad range of national security-related issues.

    Director Roemer supported the CIA mission at its headquarters in McLean, Virginia in addition to his time in the West Wing. Over his decade-long career in the U.S. Intelligence Community, he also completed assignments at the National Geospatial Intelligence Agency and the National Reconnaissance Office.

    It was a great event that helped showcase to students the vast ways their careers in cybersecurity could go. At UAT, it's important to for us to introduce students to the real world possibilities of their future. This event granted them the ability to pick the brain of a very successful cybersecurity professional.

    read more
    less

    Cybersecurity: the 6th C of Arizona


    Students Gain Industry Insight from Director Roemer On Monday, October 3, 2022, students, staff and faculty welcomed Director of the Arizona Department of Homeland Security, Tim Roemer, to ...

    Students Gain Industry Insight from Director Roemer

    On Monday, October 3, 2022, students, staff and faculty welcomed Director of the Arizona Department of Homeland Security, Tim Roemer, to University of Advancing Technology (UAT). Director Roemer was as energetic as he was insightful during his campus visit. Starting off the day, cyber students were invited to an intimate lunch where they could ask Director Roemer questions, gain insight from his experience and hear some funny stories that reminded everyone it's okay to not know everything about every thing.

    Network Security and Network Engineering student, Tyler Prettyman, shares his experience from the day. "Getting to meet Director Tim Roemer is something I am very thankful for. I feel very lucky as a student to get insight about the industry from such a high ranking government official. Not only was Director Roemer very knowledgeable, he was very friendly and fun to talk with."

    Prettyman continues, "One of the takeaways from my conversations with the director was that connections are everything. Networking with good people can lead to great opportunities. Another topic that he talked about was how to bring cybersecurity to the general audience—it was very interesting on how he did it with his own team. I feel as some of his insights and recommendations will stick with me for awhile."

    TimRoemerLunch

    After the lunch, Director Roemer presented to all students, faculty, staff and the community about the 5 C's of Cybersecurity, different from the 5 C's of Arizona, which he tested everyone on (we passed!). Roemer added, "I always say cybersecurity is the sixth C of Arizona." Before getting into the five C's, he shared what it was like when he was starting out. He was first exposed to how important cybersecurity was back in 2012 when nation-states were attacking the US financial sector—they were targeting banks, attempting to shut them down. "Cybersecurity was growing in its demand of policy makers to pay attention to it, but not a lot of people had a lot of experience in it," explained Director Roemer.

    Director Roemer was great at being transparent and sharing with the students the reality of getting started in, not just cybersecurity, but any field. "From day one it was like drinking out of a fire hose. Figuring out working with experts, how for me to be a generalist, and to bring it to a level that I really understood the nuances of cybersecurity," he continued, "and how the state was going to move ourselves forward." As he explained the progression of his role, his experience also touched on the first C of Cybersecurity. Director Roemer discussed culture, "The first thing I knew we had to do was create a culture of cybersecurity awareness. We mandated annual cybersecurity trainings for all 36,000 state of Arizona employees immediately."

    5 Cs of Cyber

    He described the different groups who are the biggest threats to cybersecurity: nation-states, criminals and hacktivists. People asked him what keeps him up most at night, and he replied, "Probably the criminals. When people are actually stealing your data, now you've got a huge problem, and the criminal networks have proved that's where they want to go. Cybersecurity knows no borders." Moving right into the fourth C of Cybersecurity, Director Roemer discussed convictions. "Actually making cybersecurity incidents into a prosecutorial issue. These events are crimes and someone needs to be held responsible." He continues, "This is not a victimless crime. You cannot get away with this anymore. We have to prosecute the cyber criminals that are out there. We need to build cases with law enforcement, and make examples out of them."

    The fifth C is consistency, which Director Roemer mentions is short and sweet but necessary. "You can do all those things [the four other C's of cybersecurity], but you can't do them once. You have to do them all day, every day, 24/7, 365." After wrapping up the 5 C's, there was a question and answer portion where Director Roemer went into more detail about his time working with the White House, his thoughts on current events and what the best advice for students is. He stressed the importance of networking in the cybersecurity field for current and future students. Ending the educational day, with a campus tour, starting with UAT's Security Operations Center (SOC), where Director Roemer said he's "been incredibly impressed."

    Sam Roethemeyer, a Network Security student, reflects on the day. "It was really insightful to hear from not only a professional in the industry but from the director of the Arizona State Department of Homeland Security. As someone who currently has an internship with the Arizona Department of Economic Security, specifically with the Security, Risk, and Compliance team, it was reassuring to hear from him about some of the difficulties they have had because they match up with some of the difficulties my team has had. I also went to the lunch with him, so we were able to get a little more personal. We picked his mind for a bit, and he gave us some tips on career business in cybersecurity. When you think about someone in his position, you would think they would be a lot more intimidating, but he was down to earth, friendly and very approachable. He told us his path through his career, and it is amazing at how time and opportunities lined up so well for him to end up in the position he is in now."

    TimRoemerSOC

    Earn a Degree In Cyber Security at UAT

    UAT offers a Master’s of Science in Cyber Security, as well as bachelor’s degrees in Network EngineeringNetwork Security, and Technology Forensics. Our Cyber Security Degree for Ethical Hackers and Network Security Curriculum has been certified through the NSA/DHS National Information Assurance Training Program in Information Assurance and Cyber Defense.

    Designated as a Center of Academic Excellence by the National Centers of Information Assurance Education (CAE/IAE), UAT’s Network Security Bachelor’s of Science degree prepares students to take on the ever-evolving world of information security.

    If you believe a career in cyber security may be right for you, request information about our degree programs. At the University of Advancing Technology, we’re passionate about helping students enter STEM fields and acquire the skills they need to land a rewarding career in cyber security and beyond.

    read more
    less

    6 Things to Know Before Choosing Network Security as Your Major


    What to Consider Before Earning a Network Security Degree Threats to network security only grow as technology advances. While network security professionals are staying up to date on the latest cyber threats, cybercriminals are working on new ways to...

    What to Consider Before Earning a Network Security Degree

    Threats to network security only grow as technology advances. While network security professionals are staying up to date on the latest cyber threats, cybercriminals are working on new ways to stump professionals. This means that the need for network security professionals is expanding daily. Not only are network security professionals needed to create the most secure network possible, but they must also be prepared to counterattack any unauthorized users. 

    A degree in Network Security could help you protect other people’s information in a world where it’s normal to entrust data to online networks. University of Advancing Technology (UAT) explains, “Network security utilizes proactive techniques, including defense-in-depth and layered security, to mitigate or eliminate vulnerabilities in information systems and to protect against potential exploitation." 

    This means that network security is important for corporations that store company and personal data online. It’s more efficient to store information digitally, but digital data can be breached, which is why network security is so important. It puts up cyber walls to impede cyber criminals from accessing people’s information. 

    network_security_degree_UAT2

    UAT's Security Operations Center (SOC) where various Cyber Security courses are held and students can utilize it as a workspace. 

    Here are six questions you may be wondering as you decide whether or not a Network Security degree is right for you.  

     

    1. What is a Network Security Degree? 

    A degree in Network Security is a specific Bachelor of Science degree within the Cyber Security curriculum that prepares you for a career in the network and information security field. At UAT, this degree offers the student real world experience and invaluable problem-solving skills training. 

    To appropriately prepare students for the ever-growing world of cyber security, this degree is one of UAT's more rigorous and sought after degree options. Fortunately, careers in network security can also be lucrative for those with a degree. 

    2. Is a Network Security Degree Worth It?  

    An undergraduate degree in Network Security from UAT offers graduates the opportunity for a career in a potentially lucrative field that is exponentially growing in demand for cyber security talent. There are several career opportunities to choose from, making this degree versatile and consistently necessary. Currently on LinkedIn in 2022, there are over 170,000 jobs listed for network security in the United States. So, a degree in Network Security is worth it in the sense of opportunity and potential growth outlook. 

    At UAT, courses are offered year-round. Therefore, full-time students can graduate in 2.8 years. You can also earn your master’s degree in Cyber Security in less time. A master’s degree in Cyber Security will potentially set you up for better job opportunities within leadership and management careers, and potentially a higher salary. While a master’s degree is not required for a successful career in network security, it can provide even more opportunities for graduates. 

    network_security_degree_UAT6

    UAT students and professors meeting in the Security Operations Center. 

    3. Does a Network Security Career Path Have Job Security? 

    Everyone providing online data needs network security. In 2022, cyber threats are more prevalent than ever, and they will only continue to grow. Strong network security can protect data from being breached. Data can come from many different places, and most of the time, releasing it is unintentional. Network security protects even the most unintentional actions from being exploited. Strong network security professionals can also fight back against these attacks, should they occur. The goal is prevention, but the job is protection. A degree in network security gives a graduate both of these skills.  

    4. Do I Need a Network Security Degree to Get a Job in Network Security? 

    While it is possible to earn a career in network security without a degree, your chances of gaining the most up-to-date and valuable information are severally threatened. You are also less likely to receive the higher salaries that network security professionals with a degree receive. Thanks to the internet, there’s a wealth of free information out there to take advantage of, but that information will only take someone so far. You also run the risk of receiving inaccurate information if it’s from an outdated or non-accredited source. A degree is the most surefire way to get the skills, mentorships and connections you need in order to achieve the career you want. 

    Industry expert and UAT’s Program Chair of Cyber Security, Aaron Jones says, “The Network Security degree is valuable because it functions as the litmus test necessary to enter the job market."

    Professor Jones goes on to explain, "It is common for influencers and even news organizations to make wild claims about how technology is an open career path that requires little or no education. The truth is that many jobs do and will continue to require a degree to enter, and some of the most lucrative career paths will continue to require higher education for admittance.” 

    The job market for cyber and network security is extremely competitive as everyone wants to have the best protection for their private data. A degree in Network Security will give a graduate the chance to properly compete for a network security career of their choosing. 

    network_security_degree_UAT5

    UAT Cyber Security Professors, Aaron Rodriguez and Jeremy Bunce observing students meeting in the UAT Security Operations Center. 

    5. Career Outlook for Network Security? 

    According to the U.S. Bureau of Labor Statistics, the job outlook for information security in 2022 is projected to be around 33%. The average job outlook for most careers is only 8%, making network security one of the fastest-growing job markets. 

    Every time a company is created, they need some level of network security to protect data. Whether it’s a customer’s data, their own, or important financial information, it’s invaluable to make sure it’s protected.  

    6. How to Choose a University with a Network Security Degree

    If you’re asking yourself where to earn a Network Security degree, you’ve come to the right place!  

    UAT is accredited by the Higher Learning Commission, an institutional accreditation agency recognized by the U.S. Department of Education.

    Also, University of Advancing Technology is a designated Center of Academic Excellence - Cyber Defense Education (CAE-CDE) institution through the National Information Assurance Education Training Program (NIETP). Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS), NIETP operates under national authority as the national manager for cyber defense education and training relating to national security systems. 

    This means that the most valuable and up-to-date technology and teaching methods are provided to UAT Network Security degree students. Students also get the opportunity to synergize their work and apply it, so they go into their chosen careers with experience already under their belt. UAT places a high value on demonstrated mastery and workplace readiness throughout its curriculum to ensure graduates are prepared for their technology careers. 

    If you think a Network Security degree sounds exciting, or you simply want to know more about it, request information or apply today.

    read more
    less

    UAT Cyber Security Professor Aaron Jones


    Professor Aaron Jones on Studying Cyber Security at UAT University of Advancing Technology (UAT) offers one of the longest-running Cyber Security degrees ...

    Professor Aaron Jones on Studying Cyber Security at UAT

    University of Advancing Technology (UAT) offers one of the longest-running Cyber Security degrees in the Southwest with a complete continuum of undergraduate and graduate degrees. A degree from the University trains students to be some of the best in the field of cyber security, while giving them the freedom to explore other technology disciplines. Professor Aaron Jones explains how mentorship plays a part in this.

    “My name is Aaron Jones and I'm the Program Champion here for the University of Advancing
    Technology for our cyber security group of majors. I have been here for a couple of years now and in addition to that, I also work in the industry as a cyber security analyst for a local law
    enforcement organization. Here at the University of Advancing Technology, you can earn a degree in Technology Forensics, Network Security and Network Engineering or a master's degree in Cyber Security."

    UAT_security_operations_center

    “Every single student is a cyber security ambassador, and it's their responsibility on day
    one to step into the shoes of a cyber security student and eventually cyber security expert. What
    I find with a lot of my students is that there's an overlapping interest. You can explore in a very
    safe environment, so I have students who, while pursuing a cybersecurity-related degree, will
    interact with our game development professors. While not necessarily directly connected to their
    degrees, there are things that interest them and inspire them."

    “What we encourage and what we build on here is developing both that internal network and that internal relationship building of working with your peers. Here within the University of Advancing Technology, mentorship is incredibly important. What I like to do is work with industry partners to make sure that our students are able to go out and participate in things like internships and externships. What I’ve found is that industry partners love that. That's the beauty of the program itself; it's designed for you to come in at any skill level and still learn something, still build, still develop and then still set you on a trajectory in the direction that you want to go.”

    Should You Major in Cyber Security? 

    UAT is a designated Center of Academic Excellence - Cyber Defense Education (CAE-CDE) institution through the National Information Assurance Education Training Program (NIETP). Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS), NIETP operates under national authority as the national manager for cyber defense education and training relating to national security systems.

    If you a natural problem solver, fascinated by information technology (IT) and the protection of privacy, data and more, a cyber security degree might be right for you. Request more information to find out more about the network security degree curriculum, potential outcomes and more. If you're ready to take the next step, apply for acceptance today! 

    Watch Professor Aaron Jones' full video here: 

    {% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True, viral_sharing=False, embed_button=False, autoplay=False, hidden_controls=False, loop=False, muted=False, full_width=False, width='1280', height='720', player_id='86817302417', style='' %}
    read more
    less

    Professor Aaron Jones on the Value of the Network Security Degree


    Interested in a Future in the Field of Network Security? Aaron Jones, the University of Advancing...

    Interested in a Future in the Field of Network Security?

    Aaron Jones, the University of Advancing Technology (UAT) Cyber Security Program Chair, is an incredible resource to gain a glimpse into the Network Security degree and what happens after you graduate.

    When not training the next generation of cyber security industry experts at the University (UAT), Professor Jones is also an AZ Peace Officer Standards and Training certified General Instructor, a software developer who creates applications for law enforcement agencies and an experienced public speaker. Read on to learn what to expect from UAT's Network Security degree straight from the subject matter expert.  

    professor_aaron_jones_UAT

    Why is a degree focused on Network Security valuable? 

    A degree in Network Security from UAT is valuable because it functions as the litmus test necessary to enter the job market. It is common for influencers and even news organizations to make wild claims about how technology is an open career path that requires little or no education. The truth is that many jobs do, and will continue to, require a degree to enter. Some of the most lucrative career paths will continue to require higher education for admittance.

    Obtaining a network security degree will help you get into the fields that matter. A cursory glance at LinkedIn job search using a Bachelor of Science in Network Security reveals jobs such as Web Application Developer, Project Engineer, Cloud Engineer and Cybersecurity Analyst II to name a scant few of the positions that require a degree.

    It is important to remember that career attainment follows a sliding scale. You will be in competition with individuals from a wide array of backgrounds and experiences, so it is important to not only obtain the skills necessary but to also be able to demonstrate how those skills make you a better choice than the next person. Therefore, obtaining a network security degree while pursuing internships, externships and other job-related pursuits will each combine to allow you to beat out the individuals you may be in competition with.

    What kind of student would enjoy a network security career?

    Students who fancy themselves guardians and protectors will enjoy network security. Your job will be to protect networks, users, and their data. You will be a vital player in most aspects of the business, and your job will oftentimes require experience in, and mastery of, many different aspects of the cyber world. You will often be required to brief others on situations and come up with plans for recovery when times are tough.

    The most important aspect of cyber security is a willingness to tackle tough challenges, immerse yourself in continuous education, and to have a desire to be better every day. You cannot enter a career in cyber security with a desire to grow stagnant. You will need to constantly familiarize yourself with new tools, understand your enemy, and be prepared to take action as needed. It's a lot of effort, but if you like to be active, you will enjoy cyber security.

    What does the path to a Network Security degree look like? 

    Your experience will vary, and I would be remiss if I did not urge you to consider how you plan to participate in your education journey. You can choose to sign up for school, participate at a baseline level, and then graduate without any additional effort or expenditures. Don't do this. Your journey can consist of events, competitions, and opportunities that you should take advantage of. As a student, you should be seeking out methods to make yourself stand out from others. You are in direct competition with every other candidate, and you should treat it as such.

    A student who wants to see success after they graduate will sign up for classes, network with their instructors and fellow students, and participate in the variety of opportunities available to them. This can include numerous events that would be available, and at UAT will be advertised during classes, by the faculty or in the cyber security student Discord channel.

    The journey of earning a degree in Network Security can be daunting but with perseverance and a willingness to make the most of it, you will find it to be fun and exciting. You will also develop relationships that may last years or decades after you graduate. You will discover that the cyber security field is remarkably tight-knit and full of interesting characters you will run into again and again.

    What types of special projects, internships etc are available? 

    For UAT students, there are special projects, internships and more that they will get exclusive opportunities for. Students can work as interns for several government agencies, participate in externships with numerous companies, and many have been employed by companies in the local area as well. Our students are often urged to give back to the community, and several of our students have participated in supporting educational institutions, such as local high schools, worked as interns in law enforcement cyber positions and provided technical support for high school level cyber competitions.

    The UAT factor is a willingness to give back to the community and to work towards improving the cyber footprint of not only Arizona but also the United States as a whole.

    What should incoming students know before choosing UAT?

    Be ready to work, volunteer when you can, and don't hesitate to ask questions and stretch your comfort level. You will need to familiarize yourself with a plethora of tools and be ready to constantly learn. The potential for success in this field is high, and you will discover that every effort will be rewarded if you are willing to try. Don't hesitate to pursue your interests in cyber security, even outside of the field because many professors and mentors at University of Advancing Technology are willing to give you a hand if you try.

    What innovative field developments are happening right now?

    Multiple regional conflicts have contributed to an increase in attacks on American infrastructure and cyber security expertise is in high demand. Now is the best time to get started in pursuing cyber security as a career and your skills will be put to use in almost every field you may be interested in. The sky is the limit, especially right now.

    What are some potential Network Security degree outcomes?

    I am of the opinion that the cyber security field is a high potential outcome field with plenty of opportunities. Cyber security is an important aspect of nearly any business and the need for professionals who can work in this field does not seem to be slowing down. You simply cannot run a business successfully without securing that business, and while some are willing to take the risk, we are consistently seeing that any hubris is rewarded with severe damage to the business.

    You can work in the cyber security field in a generic role, in a security operations center, as an analyst, in systems administration, or as a software developer to name a few jobs available to someone with a degree in Cyber Security. You should begin looking for jobs as you enter your first year in school. I recommend this because it gives you time to start choosing jobs that interest you while aligning your choices of class and extra-curricular activities towards a convergence that gets you into the position you desire.

    How to take the next step toward Network Security #TechRespect

    University of Advancing Technology is a designated Center of Academic Excellence - Cyber Defense (CAE-CD) institution through the National Information Assurance Education Training Program (NIETP). Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS), NIETP operates under national authority as the national manager for cyber defense education and training relating to national security systems.

    Ready to get started? First, request more information about UAT's Network Security degree and get connected to an admissions advisor to get all of your questions answered and explore life at UAT further to help you decide if this is the right path for you.

    Already done all that? Register for our next UATx, schedule an in-person or virtual tour led by a UAT Student Ambassador, or apply for acceptance today! Your future creating and innovating technology awaits!

    read more
    less

    Cyber Security Students Welcome Their New Peers with a Challenge


    Current and New Students Come Together for Capture The Flag On September 2nd, after two days full of connection-building activities for the new students of University of Advancing Technology (UAT), many embarked on their journey into the challenging...

    Current and New Students Come Together for Capture The Flag

    On September 2nd, after two days full of connection-building activities for the new students of University of Advancing Technology (UAT), many embarked on their journey into the challenging world of network security. That evening, several seasoned students hosted a Capture The Flag event for incoming students in the University's (UAT) Security Operations Center (SOC). Cyber Security Associate Professor, Jeremy Bunce moderated the event for all participants.

    "As a way to help build the cyber community here at UAT, the current students wanted to run an event for the new incoming students joining UAT this Fall semester," says Bunce.

     

    UAT_Jeremy_Bunce_CTF

    Jeremy Bunce is also an alumnus who graduated from UAT in 2019 with his Bachelor of Sciences in Network Security and Technology Forensics. As a prior Student Ambassador and actively involved student, Bunce understands what it's like for those new to the university. 

    "It was awesome to see the more senior students wanting to reach out and welcome the new students," says Bunce. 

    What is a Capture The Flag event?  

    A similar concept to the game you may have played as a kid in gym class or your friend's birthday party, Capture the Flag is also a well-known cyber security event where two teams battle to demonstrate their skills attacking and defending computer resources. 

    "The challenge consists of finding a hidden string in text called a flag. The challenges range from finding a file inside a word document to decoding a message to get the flag," Bunce explains.

    University of Advancing Technology has hosted many Capture The Flag events previously for students and the community, like CodeDay and more. Therefore, it's in full UAT fashion to introduce competitive challenges like this to help new students establish those critical early connections. It also exposes them to UAT's methodology of utilizing each other's strengths and technological skills to solve complex problems and work together to build something innovative. 

    Like the playing of Capture The Flag, the event planning aspect was collaborative as well.  "This specific event was designed last semester in the cyber security competition course we offer, with a mix of challenges that came from the students and myself." 

    Bunce shared that "the event went great with many talented freshman completing challenges." 

    capturetheflag

    Interested in Cyber Security? 

    Want to learn more? Explore UAT's cyber security degrees: 

    Keep up with all upcoming Cyber Security events hosted in UAT's Security Operations Center and the latest news from the UAT Cyber Security Newsfeed

     

    read more
    less

    A Network Security Degree: Requirements, Expectations and Applications


    It’s no secret that the more technologically advanced our world gets, the more we have to participate in it. This is great for connecting people worldwide and maximizing availability, but it introduced a rapidly expanding problem: network security.    What is a Network...

    It’s no secret that the more technologically advanced our world gets, the more we have to participate in it. This is great for connecting people worldwide and maximizing availability, but it introduced a rapidly expanding problem: network security. 

     

    What is a Network Security Degree?

    When you give your personal information out to third parties (or make your information available), it’s important to make sure that information is being protected. A degree from The University of Advancing Technology (UAT) in Cyber Security can give you the opportunity to develop ways to protect people’s private information, ethically hack, and gain a lucrative career in IT. Every company with information backed up electronically is in need of cyber security, so there are plenty of job opportunities awaiting.

    According to Aaron Jones, UAT’s Program Champion and Professor of Network and Cyber Security, “This degree is valuable in because it functions as the litmus test necessary to enter the job market. It is common for influencers and even news organizations to make wild claims about how technology is an open career path that requires little or no education. The truth is that many jobs do and will continue to require a degree to enter and some of the most lucrative career paths will continue to require higher education for admittance.”

    UAT has a few different Cyber Security degree programs. There are three Bachelor of Science degrees to choose from in this field: Network Security, Network Engineering, and Technology Forensics. To enhance knowledge and career opportunities, UAT offers a Master of Science in Cyber Security. All of these degrees give students of any experience level valuable information that can prepare them for the complicated, important world of cyber security. 

    UAT_Network_Security_degree_1

    Network Security student, Tyler Prettyman working in the Security Operations Center (SOC).  

    What Qualifications To Look For in a University's Network Security Degree Program?

    Before considering a network security degree program from any college or university, it's important to identify the ways its program is distinguished from all others. This includes looking at the institution's accreditation and any supportive industry recognition, partnerships, qualifications and more. Diving deeper, also reviewing the curriculum and talking to an advisor about mentorship programs, special projects or internships will help to further demonstrate the program's ability to provide you with a valuable education.  

    UAT is accredited by the Higher Learning Commission (hlcommission.org), an institutional accreditation agency recognized by the U.S. Department of Education.

    University of Advancing Technology (UAT) is also a designated Center of Academic Excellence - Cyber Defense Education (CAE-CDE) institution through the National Information Assurance Education Training Program (NIETP). Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS), NIETP operates under national authority as the national manager for cyber defense education and training relating to national security systems.

    All of this means that UAT is more than adequately able to prepare students for a real job in cyber security, supported by some of the best cyber security corporations in the country.

    UAT_Network_Security_SOC

    UAT_security_operations_center

    University of Advancing Technology's Security Operations Center (SOC). 

    Network Security Degree Requirements

    The network security degree program requirements combine studies with application. 

    Network security professionals work to keep information private, integral, and available. This specific degree focuses on theory application aligned with industry standards. Students in this degree program will have several objectives to prepare them for the cyber security workforce. 

    They will get the opportunity to create network designs that implement proper security measures and install and test existing security hardware and software tools. They will also construct their own policies related to cyber security and practice preparing for the worst-case scenario. There is also a focus on building ethical and legal understanding among students (so as not to create a bunch of evil computer geniuses). 

    Finally, students will get to research and evaluate several security-based threats and develop original systems to prevent cyber security threats and incidents.

    Network Security Degree Curriculum and Courses

    There are a number of valuable and interesting courses that make up the Network Security degree program.  A student’s network security foundational courses include Computer Forensic Essentials, Foundations of Network Engineering, and Network Engineering Hardware. These courses and more are designed to lay down the groundwork for network security as a whole. Students will learn what causes cyber-attacks, how modern networks operate and get preparation and practice for real tasks that must be performed by IT professionals.

    Next, the skill development courses of the Network Security degree from UAT focus on utilizing the fundamentals through application to develop and enhance their skills. These courses are designed to sharpen specific skills and interests. Courses include Introduction to Databases, Programming for Hackers, and Security Applications. 

    Students will learn how to track and record data, how to ethically hack and understand cyber defense techniques, and stay up to date on security applications and appliances they will likely be using after they graduate.

    The final set of degree-specific courses for network security students synthesizes knowledge from the previous courses and applies it to actual situations and organizations. Courses include Exploit Development, Network Defense and Countermeasures, and International and Federal INFOSEC Standards and Regulations. Students will learn what makes a network vulnerable, how to find vulnerabilities in a network and the specific ways a network can be defended.

    Many of these courses as well as general education courses from UAT also give students the opportunity to build on their portfolios. Additionally, each student is required to develop a Student Innovation Project (which has been compared to a state school's master's thesis) and complete boards in order to graduate. Through these projects and presentations, they prove themselves as innovators in network security, which is critical to achieving demonstrated mastery and job readiness.

    While this might sound like a lot, the reward is worth the invested effort. 

    “The journey of earning a degree in network security can be daunting,” says Professor Jones, “But with perseverance and a willingness to make the most of it, you will find it to be fun and exciting. You will also develop relationships that may last years or decades after you graduate. You will discover that the cyber security field is remarkably tight-knit and full of interesting characters you will run into again and again.”

    UAT_network_security_degree_8

    Who Is The Network Security Degree For?

    As Professor Jones puts it,  “Students who fancy themselves guardians and protectors will enjoy network security. Your job will be to protect networks, users, and their data. You will be a vital player in most aspects of the business and your job will oftentimes require experience in and mastery of many different aspects of the cyber world. You will often be required to brief others on situations and come up with plans for recovery when times are tough.”

    Moreover, anyone with a passion for cyber security may find this degree intriguing. Network security can be beneficial to personal router usage and, of course, corporation routers. When a network is properly secured, it can protect data from being taken and/or destroyed. This is extremely important for corporations that deal with sensitive, personal data from their customers. 

    This is more than just leaked phone numbers (although, those are also important to protect). Working in network security could allow you to protect people’s social security numbers, medical information, addresses, and more. Ultimately, by protecting people’s information, you can save their lives.

    You may wonder, “Is a degree in cyber security worth it?” It is if you’re confident enough to explore one of UAT’s most challenging degree programs and crave a fulfilling, lucrative career. Fortunately, there are a myriad of careers in cyber security that a network security major can explore.

    UAT_Network_Security_Degree_4

    Network Security student, Tyler Prettyman working in the SOC in his UAT hacker hoodie

    Are You The Next UAT Network Security Innovator? 

    UAT students in the network security degree program also get access to special opportunities to work as interns for several government agencies, participate in externships with numerous companies, and have been employed by companies in the local area as well. No matter what path they take, the Network Security degree opens many doors to exciting careers.

    If you have a knack for solving complicated problems and foreseeing complications before they occur, network security could be for you. It is also a lucrative career that persists throughout economic struggles and technological evolution, which guarantees a consistent need for network security professionals.

    UAT students get hands-on experience with their peers and professors that provides valuable, versatile information no matter where a student ends up after graduation. Students of varying skills and interests will have the opportunity to explore those while maintaining a focus in cyber security. This ensures every graduate has the foundational skills necessary for the cyber security workforce regardless of where their interests lie. The Network Security degree will give students the ability to not only comprehensibly understand tasks and procedures involved in cyber security but choose specific paths related to it and maximize their chances of success.

    Learn more about becoming an ethical hacker through UAT's Network Security degree. Get connected with a UAT Admissions Advisor to help you with the next steps to getting you all the information you need, or apply for acceptance now.  

    read more
    less