header partial here
1
2
3

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

 
 
Next
Previous
 
Next
University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By clicking submit, you verify you are at least thirteen years of age, give us permission to store and process your personal information submitted above, and contact you through email, post, SMS, phone, autodialed and/or pre-recorded telemarketing. Carrier fees may apply to SMS messages, which can be opted out of at any time by replying STOP. Read our privacy policy here. Please note that such consent is not required to attend UAT and you may update your communication preferences at any time.
Previous
 
Submit

ABOUT UAT
University of Advancing Technology is an elite, private college that serves its student body by fostering knowledge creation and academic excellence in an environment that embraces the young technophiles of the world. With three centers of research and a suite of technology-centered undergraduate and graduate degrees, the University is a recognized leader in technology education.

Learn More About UAT

    Honoring Veterans at UAT: A Tribute to Service, Education, and Innovation


      On this Veterans Day, we express our deepest gratitude for the immense contributions veterans make to our country, both during their service and after they transition to civilian life. For many veterans, the journey doesn't end with their ...

     

    On this Veterans Day, we express our deepest gratitude for the immense contributions veterans make to our country, both during their service and after they transition to civilian life. For many veterans, the journey doesn't end with their military career; it evolves into new challenges and opportunities that shape their futures. At University of Advancing Technology (UAT), we are proud to support veterans in their educational journeys, providing them with the tools, mentorship, and community to thrive in the ever-evolving fields of technology and cybersecurity.

    Let’s spotlight some of the remarkable veterans at UAT who embody these values through their journeys:

    Navigating the Cybersecurity World: Briant Becote, PhD

    Briant Navy BootcampProfessor Briant Becote, a UAT Cyber Security professor, brings a wealth of experience from both the Army National Guard and the U.S. Navy. With over two decades of service, Becote’s military background includes working as a Surface Sonar Technician and later as a Naval Flight Officer. His career provided him with a unique blend of technical expertise and leadership skills, which he now imparts to his students.

    Becote’s path to teaching was shaped by his desire to give back to others. "The Navy offered me the opportunity to learn and grow through education," he shares. "After joining with only 12 college credits, I retired in December of 2023 with two master's degrees and a PhD, all without any student loans." This commitment to lifelong learning and personal growth is central to his approach as an educator.

    His experiences across 25 countries and in various military roles allow him to provide students with a global perspective on technology, leadership, and security. Becote’s work at UAT is driven by a deep understanding of the importance of mentorship and the desire to help students navigate the complexities of the cybersecurity field, just as he did in his own career.

     

    From Military Service to Educator: Aaron Rodriguez

    Fabcom_UATPortraits20245656Professor Aaron Rodriguez, a Cyber Security instructor at UAT, served 11 years in the U.S. Air Force, where he was an Aircraft Armament Specialist. His service took him to various locations around the world, from South Korea to Japan, and provided him with invaluable life lessons that continue to influence his work today.

    Rodriguez joined the Air Force with the goal of seeing the world—a goal that he certainly accomplished. Along the way, he learned the importance of patience, teamwork, and precision—skills that have seamlessly transitioned into his teaching philosophy. "The military lifestyle has been burned into my brain," Rodriguez reflects. "The most important quality I picked up was patience, and it has always helped me stay calm in difficult or uneasy situations."

    As a professor at UAT, Rodriguez is able to inspire and guide the next generation of cybersecurity professionals, many of whom are veterans like him. His experiences in the Air Force not only shaped his approach to education but also strengthened his commitment to helping his students succeed in the rapidly evolving field of cybersecurity. "The military fast-tracked skills that prepared me for what life had in store," he says.

    From Combat to Code: Alexander McPeake

    For Alexander McPeake, a veteran of the U.S. Air Force, the transition into the world of cybersecurity wasn’t an easy one—but it was one he pursued with determination. After suffering a traumatic brain injury, McPeake turned to education to redefine his career. "I wanted to work with computers, but coding wasn’t for me. I figured networking would allow me to do that without the coding," he explains.

    McPeake found a path at UAT, where he enrolled in an online degree program for networking engineering. UAT’s hands-on learning approach allowed him to gain the real-world skills needed to thrive in the fast-paced technology industry. Now, as a Master's degree student in Cyber Security, McPeake works as a data center engineer at Switch, a leader in exascale data center ecosystems.

    McPeake’s story highlights the importance of adaptability and resilience—qualities that veterans often develop during their military service and carry with them into their civilian careers. Today, he plays a crucial role in maintaining secure infrastructures at Switch, with aspirations to grow further into network security and security analysis. His journey underscores the transformative power of education and the opportunities that veterans have to reshape their careers in the technology world.

    Veterans in Technology: Ryan Golden and Nathan Parry

    13330987_10154285710337899_1879061090033605827_nAt UAT, veterans are not only finding educational success but are also becoming integral members of the technology community. Ryan Golden, an Army veteran who served in Iraq and Jordan, is currently pursuing a Data Science degree at UAT. His military background in unmanned aerial systems and Linux systems ignited a passion for technology and data. "The military taught me a sense of timelines and purpose, which now pushes me to go back to school and earn an official degree in Data," Golden says. His story is one of perseverance and dedication—traits that are invaluable in both the military and technology fields.

     

    Similarly, Nathan Parry, a Navy veteran who served for six years, is now pursuing a degree in Virtual Reality at UAT. His initial interest in network security shifted to VR, thanks to the launch of the Oculus Quest 2. Parry’s military experience has shaped his approach to education, helping him navigate the challenges of transitioning back to school and setting his sights on a future in virtual reality development. "UAT has been exceptional in providing the flexibility I need to balance school with my established life," Parry shares.

    UAT’s Commitment to Veterans

    These stories represent just a small sample of the many veterans who are thriving at UAT. The University’s commitment to supporting veterans is reflected not only in the tailored educational programs but also in the inclusive, flexible environment that UAT provides. Whether it’s through career-focused degrees or personalized support services, UAT is dedicated to helping veterans succeed as they transition into civilian careers in technology.

    On this Veterans Day, we honor the dedication, sacrifice, and resilience of veterans like Aaron Rodriguez, Briant Becote, Alexander McPeake, Ryan Golden, and Nathan Parry. Their stories are a testament to the strength of the veteran community and the power of education to transform lives. As these veterans continue to shape the future of technology and cybersecurity, UAT remains proud to be part of their journey.

    For those interested in following in their footsteps, UAT offers a range of degrees designed to empower veterans and equip them with the skills needed to succeed in the digital age. Whether you're interested in cybersecurity, data science, virtual reality, or another advancing technology field, UAT is here to support your educational goals and help you achieve success.

    Happy Veterans Day from UAT! Thank you for your service.

    read more
    less

    From Service to Cybersecurity: Professor Becote


    In an era where cybersecurity is paramount, few can bring the unique blend of experience and insight that UAT Professor, Briant Becote, PhD, offers. A veteran of both the Army National Guard and the U.S. Navy, Professor...

    In an era where cybersecurity is paramount, few can bring the unique blend of experience and insight that UAT Professor, Briant Becote, PhD, offers. A veteran of both the Army National Guard and the U.S. Navy, Professor Becote's journey is as diverse as it is inspiring. From his early days as a bandsman to a distinguished career as a Naval Officer, he has navigated the complexities of military life, acquiring invaluable skills and perspectives along the way. Now, as a Cyber Security Professor, he leverages his extensive background to educate the next generation of technology leaders. In this interview, we explore his motivations for joining the military, the lessons learned through rigorous training, and how his experiences have shaped his approach to teaching and mentoring students today. Join us as we delve into the remarkable story of a man who has dedicated his life to service and education.

    Briant Army, 1997, age 17

    What were some of the reasons that you joined the military? How did you choose your branch of service?  How many years did you serve?

    I enlisted in the Rhode Island Army National Guard as a bandsman (a saxophone player) just a week after turning 17 (Army photo attached, 1997).  In exchange for my service (playing concerts and parades throughout the year), I was able to use the band's new and excellent musical instruments.  I had access to any instrument I wanted to learn and addition to being paid to play!

    I served in the Army National Guard for four years prior to joining Active Duty, US Navy in 2001.  My grandfather served in the Navy for over 20 years and my father served in the Army during the Vietnam War.  I chose the Navy as I wanted to see the world.

     

    How many years did you serve?

     I served in the Guard for four years, and Active Duty Navy for 23 years.

     

    Briant Aviation

     

    Tell me a little about your time in bootcamp.

    I participated in three bootcamps.  Army bootcamp, Navy bootcamp, and Office Candidate School.  Unlike Enlisted bootcamp, in Office Candidate School, attrition is the mission. I don't think it's an exaggeration to say Marine gunny sergeants that would rather be on the front line of [insert war of choice] take some measure of pleasure in breaking down officer candidates to the studs.  

     

    What was your primary job after training?

    My rate (Enlisted job in the Navy) was Surface Sonar Technician (STG).  One of the few roles in the Navy in which you're both a technician (required to fix sonar electronic gear) in addition to being a tactician (Sonar Technicians are directly responsible for directing ship movement and tactical employment of sensors and weapons during anti-submarine operations).  

    I was selected for Commissioning (the process to become an Officer in the military) after serving for nine years as a Sonar Tech.  I was commissioned as a Naval Flight Officer (NFO) in 2010 and flew/supported a variety of aviation platforms including the P-3 Orion,  the P-8 Poseidon and was one of the original officers of the Navy's first squadron of MQ-4C Triton unmanned aircraft.

     

    Briant Navy Bootcamp

    Where were you stationed and where did you travel while in the service? Where were you stationed and where did you travel while in the service?

    I was stationed San Diego and Japan (while enlisted), Newport RI (Office Candidate School), Pensacola FL (Aviation Training), Jacksonville FL and Bahrain (as an Officer).  I've deployed to, traveled in, and operated from all over the world to include over 25 countries.

     

    Tell me a funny story you experienced that could only happen in the military.

    All the funny stories I experienced that could only happen in the military I can't tell you about 😉 

     

    How do your military experience affect your life today?

    One of the most unique aspects of over a decade of service as a Naval Officer is the variety of roles you're required to fill.  From training, maintenance, admin and operations to leading organizations and serving as an international liaison - there isn't much I haven't done.  I led the establishment of a nonprofit store for our squadron that required the same budgeting, purchase, and logistic requirements that any for-profit sales organization would require. 

     

    Tell me a couple of your most memorable experiences.

    In the process of starting that nonprofit, my social security number was incidentally attached to the squadron's store sales.  The IRS audited me for three years suggesting I owed an additional $50,000 in taxes!

     

    Briant OfficerHow do your military experience affect your life today? How did your military career lead you to your career now, and UAT?

    Having traveled, lived and worked throughout the world, I have a broader perspective than most.  Being a Sonar Technician taught me to be an electrician and a plumber (I know right), and being a Naval Officer taught me lead people, programs, teams and organizations.  The Navy offered me the opportunity to learn and grow through education - and after joining with only 12 college credits, I retired in December of 2023 with two master's degrees and a PhD without any student loans.  Having the opportunity to give back to students on their journey through education and the unique approach that UAT offers led me to becoming a Cyber Security Professor.

    Ready to Become a Digital Defender?

     

    Take the first step toward a cybersecurity career. Request information or apply today — it's quick, easy, and there’s no application fee. 

    Together, we can build a safer digital future. Start your journey at UAT today!

     

    read more
    less

    UAT Students Visit the FBI Field Office


    UAT Cyber Security Students Discover Opportunities at FBI Recruitment Event (Sorry, no pictures allowed at the field office!)...

    UAT Cyber Security Students Discover Opportunities at FBI Recruitment Event (Sorry, no pictures allowed at the field office!) 

    Recently, students from the University of Advancing Technology (UAT) majoring in Cyber Security had an incredible opportunity to attend an FBI recruitment event, opening their eyes to a variety of career paths within the Bureau. With the increasing importance of cyber defense and digital forensics, UAT students were particularly excited about how their skills could align with the needs of one of the nation’s top law enforcement agencies. 

    The event showcased a range of entry-level positions, each critical to the FBI’s mission of ensuring national security and public safety. Here’s a look at some of the roles that captured the students' attention: 


    Evidence Technician
    : Students learned about the crucial role Evidence Technicians play in collecting and preserving physical evidence from crime scenes. This position emphasizes attention to detail and a methodical approach, skills that many UAT students excel in. 

    Intelligence Analyst: For those with strong analytical skills, the role of Intelligence Analyst stood out. This position involves sifting through vast amounts of information to identify patterns and trends, making it a perfect fit for tech-savvy students. 

    Data Analyst: Similar to Intelligence Analysts, Data Analysts focus on interpreting complex datasets. UAT students appreciated how their training in data management could contribute to significant investigative efforts. 

    Digital Forensics Examiner: Given the focus on cybersecurity, many students were particularly intrigued by this role. Digital Forensics Examiners analyze digital evidence to uncover information about criminal activities, a key area where cyber skills are in high demand. 

    Digital Operations Specialist: Students saw this role as an exciting way to leverage their knowledge in managing and optimizing digital tools for investigative purposes. 

    Independent Contract Linguist and FBI Linguist: With the FBI’s focus on communication, these positions appealed to students with language skills, highlighting the diverse ways one can contribute to national security. 

    Electronics Technician: For those with a knack for electronics, this role supports the Bureau’s operations by maintaining and repairing essential equipment. 

    FBI Special Agent: The role of Special Agent captured the imagination of many, as it involves direct engagement in investigations and national security efforts. 

    Additionally, internal applicants learned about the Tactical Specialist position, which requires a specialized skill set for high-stakes operations. 

    The event allowed UAT Cyber Security students to connect with FBI representatives, ask questions, and gain insight into the rigorous application process. With the FBI's commitment to building a skilled and diverse workforce, students left feeling inspired and empowered about their potential careers. As they look toward the future, the possibilities for making a difference in national security have never seemed brighter. 

     

    read more
    less

    Understanding and Addressing Common Cybersecurity Blind Spots


    October marks Cybersecurity Awareness Month, a crucial time for businesses and individuals alike to reassess their digital defenses. As we navigate an increasingly interconnected world, the need for robust cybersecurity measures cannot be overstated. A recent ...

    October marks Cybersecurity Awareness Month, a crucial time for businesses and individuals alike to reassess their digital defenses. As we navigate an increasingly interconnected world, the need for robust cybersecurity measures cannot be overstated. A recent article by Robert Walker, Director of Community Initiatives at University of Advancing Technology (UAT) in the Phoenix Business Journal highlights several common blind spots that organizations often overlook when it comes to cybersecurity. Let’s delve deeper into these issues and explore how proactive measures can mitigate risks.

    1. Employee Training and Awareness

    One of the most significant vulnerabilities in any organization's cybersecurity posture is the human factor. Employees, while essential assets, can inadvertently expose the company to threats through actions like clicking on phishing emails or using weak passwords. Regular cybersecurity training sessions are vital to educate employees about recognizing phishing attempts, understanding secure data handling practices, and maintaining vigilance in their digital interactions. At UAT, we prioritize comprehensive training programs to ensure our staff and students are well-equipped to face these challenges.

    2. Patch Management

    Software vulnerabilities are frequently exploited by cybercriminals to gain unauthorized access to systems. Yet, many organizations struggle with timely patch management. Failure to promptly apply security patches and updates leaves systems exposed to known vulnerabilities. Implementing a robust patch management strategy ensures that all software and systems are regularly updated, reducing the window of opportunity for attackers. UAT emphasizes the importance of maintaining updated systems, especially in our tech-driven curriculum.

    3. Mobile Device Security

    With the proliferation of mobile devices in the workplace, ensuring their security is paramount. Mobile devices often store sensitive data and connect to corporate networks, making them attractive targets for cyber threats. Businesses should enforce strong mobile device management policies that include encryption, remote wipe capabilities for lost or stolen devices, and regular security updates. At UAT, we encourage students to adopt best practices for securing their devices, preparing them for future careers in technology.

    4. Third-Party Risk

    Collaborating with third-party vendors and contractors can enhance business operations but also introduces cybersecurity risks. Many organizations overlook the security practices of their third-party partners, assuming they have adequate protections in place. Conducting thorough security assessments and requiring compliance with cybersecurity standards can mitigate these risks and ensure a more secure business ecosystem. UAT fosters partnerships with tech companies, ensuring that both students and partners understand the importance of cybersecurity across all collaborations.

    5. Data Backup and Recovery

    Data loss can cripple a ackupobusiness, yet insufficient or irregular data backup practices are prevalent. Ransomware attacks and other data breaches can result in critical data being encrypted or stolen. Implementing automated and secure backup solutions, along with regularly testing data recovery procedures, is essential to minimize downtime and ensure business continuity in the event of a cyber incident. UAT’s commitment to data integrity and recovery training prepares our students for real-world scenarios, ensuring they understand the importance of backup protocols.

    Conclusion

    As cybersecurity threats continue to evolve, so must our defenses. Addressing these common blind spots requires a proactive approach that integrates education, policy enforcement, and technological safeguards. By prioritizing cybersecurity awareness and implementing robust practices across all levels of the organization, businesses—and educational institutions like UAT—can better protect themselves from potential cyber threats and safeguard their valuable assets.

    This Cybersecurity Awareness Month, let's commit to strengthening our defenses and staying vigilant against emerging threats. Together, we can create a more resilient and secure digital landscape for everyone.

    At UAT, our suite of cyber security degrees and related fields prepare students to tackle these challenges head-on, equipping them with the knowledge and skills needed to excel in the ever-evolving tech landscape. Request information today and become part of the solution!

    read more
    less

    Secure Our World: Simple Steps for Cyber Safety


    October marks Cybersecurity Awareness Month, a time to focus on securing our digital lives. The theme for this year, “Secure Our World,” emphasizes that cybersecurity isn’t just for the tech-savvy—it’s for...

    October marks Cybersecurity Awareness Month, a time to focus on securing our digital lives. The theme for this year, Secure Our World,” emphasizes that cybersecurity isn’t just for the tech-savvy—it’s for everyone. In today’s hyper-connected world, taking proactive steps to protect your online presence is crucial. Here are four easy ways you can strengthen your cybersecurity today.

    1. Recognize & Report Phishing

    Phishing scams have evolved, becoming increasingly difficult to spot. Whether it’s an email asking for personal info or a suspicious link, these scams are red flags. Instead of engaging, report the phishing attempt and delete the message. Staying vigilant not only protects your data but also helps secure the broader network.

    Want to learn more? Explore CISA’s phishing resources for detailed insights.

    1. Use Strong Passwords

    Passwords are your digital gatekeepers. If you’re still recycling weak passwords, it’s time to upgrade. Strong passwords should be long and unique, combining uppercase, lowercase, numbers, and symbols. Better yet, use a password manager to keep everything secure and accessible.

    Need password tips? Check out the NIST guide on creating strong passwords.

    1. Turn On Multi-Factor Authentication (MFA)

    A single password isn’t enough in today’s digital landscape. Multi-Factor Authentication (MFA) adds a critical layer of protection, making it much harder for cybercriminals to break into your accounts. Be sure to enable MFA on important accounts, especially email and financial services.

    Ready to set up MFA? Here’s a step-by-step guide to get you started.

    1. Update Software Regularly

    Software updates can feel like a hassle, but they’re essential for protecting your devices. These updates patch security vulnerabilities and help guard against the latest threats. Make it a habit to check for updates regularly, or better yet, set them to update automatically.

    Why updates matter? Learn more at StaySafeOnline.

    Building a Safer Digital World Together

    By adopting these simple yet powerful practices, you can contribute to a safer online community. Cybersecurity is a shared responsibility—talk to your family, friends, and colleagues about these steps to create a more secure digital space for everyone.

    Take the Next Step: Pursue a Cybersecurity Career

    If the world of cybersecurity intrigues you, why not take it to the next level? The University of Advancing Technology (UAT) offers a suite of innovative cybersecurity degrees designed to equip you with the skills to tackle modern digital challenges.

    With online and on-campus options, UAT’s programs offer flexibility to fit your schedule. UAT is designated as a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA), giving you access to real-world, hands-on learning experiences.

    Ready to Become a Digital Defender?

     

    Take the first step toward a cybersecurity career. Request information or apply today — it's quick, easy, and there’s no application fee. 

    Together, we can build a safer digital future. Start your journey at UAT today!

     

    {% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True, viral_sharing=False, embed_button=False, autoplay=False, hidden_controls=False, loop=False, muted=False, full_width=False, width='300', height='270', player_id='178828555668', style='' %}

     

    read more
    less

    The Current State of Cybersecurity - Fall 2024


    Has the cyber landscape changed in the last five years? Yes and no. Let's discuss. While Artificial Intelligence (AI) technology isn't new, its widespread adoption through readily available...

    Has the cyber landscape changed in the last five years? Yes and no. Let's discuss.

    While Artificial Intelligence (AI) technology isn't new, its widespread adoption through readily available Large Language Models (LLMs) such as ChatGPT and Gemini has streamlined both the learning and application of cyber threats across the entire spectrum of cyber-based technologies. Despite efforts by AI model authors to curtail explicit guidance for criminal activity, creative solutions through prompt engineering and home-grown models enable users to fast-track the development and use of exploits, especially zero-day vulnerabilities, at an increasing and alarming rate.

    Ransomware as a cyber tool used to exploit individuals and high-value targets alike, has seen significant growth in the last five years. While not new (recall the WannaCry attack in 2017), ransomware is now more sophisticated and easier to use through exploit kits and Ransomware-as-a-Service (RaaS) offerings, further enabling cyber as a force for harm. Recent statistics show a half a billion ransomware attacks detected in 2022 alone, with the average ransom payment rising to $1.85 million in 2023 (Varonis, 2024).  Additional sources cite 72.7% of all organizations globally fell victim to a ransomware attack in 2023 (Cobalt, 2023).

    Although the COVID-19 pandemic appears to be in the rearview mirror, we continue to cite it as a force of change in all facets of life. The landscape of cybersecurity is no exception. As many organizations shifted to remote work, disrupting remote-enabling technologies became a focal point for exploitation. The expansion of these techniques is expected to continue despite the growing trend to return workers to the office. In fact, a recent study illustrated on average a cyber attack occurring every 32 seconds throughout 2023 (Cobalt, 2023) with remote work being a significant contribution to the vulnerabilities exploited.

    Larger and more frequent data leaks seem to be largely desensitizing the public to the loss of personal sensitive information. In many ways, we appear to be moving from "trust but verify" to "zero trust" to "zero privacy". Regulations such as General Data Protection Regulation (GDPR) enforced by the European Union have largely improved data security requirements for our European counterparts and those conducting business overseas, but the US continues to lag in setting similar standards stateside. However, the proposed American Data Privacy and Protection Act (ADPPA) shows promise in addressing this gap.

     

    1123_SOC-Bunce9

    Each of these examples highlights the evolution of cyber exploitation, and it's certainly notable that security researchers are equally at task in identifying solutions. Nations are developing coalitions to cooperatively combat cybercrime. But at the heart of today's cyber landscape are nation-state endorsed cyber threats.

    In a war that has largely become an afterthought for many Americans, the future of cyberwarfare is playing out in real time. As common as missiles and bullets, attacks on cyber infrastructure in Russia and Ukraine are laying the foundation for expectations in war for years to come. The NotPetya attack of 2017, initially targeting Ukraine but spreading globally, serves as a stark reminder of the potential collateral damage in cyber conflicts.

    While supply chain attacks have been a technique for exploiting enemy weaknesses nearly as long as war itself, Israel's leverage of this ancient technique to implant devices with explosives and coordinate remote detonation is strikingly impressive and alarming in the same breath. This demonstrates the evolving intersection of physical and cyber warfare.

    In the age of technology, evolution isn't an expectation; it's directly woven into the fabric of all things. The nature of cybersecurity and exploitation, and the principles that drive security at large, have changed very little over the last five years (or twenty, for that matter). However, the speed, scope, and delivery of threats and security responses drive the constant shift of the cyber landscape we can expect to see for the foreseeable future. 

    Looking ahead, emerging technologies like quantum computing pose both new threats (potentially breaking current encryption methods) and opportunities (quantum-resistant cryptography) for cybersecurity. Additionally, the growing Internet of Things (IoT) ecosystem continues to expand the attack surface, necessitating new approaches to security in an increasingly connected world.

    Want to learn more? Check out UAT's suite of Cyber security degrees here.

    References

    Varonis. 2024. Ransomware statistics, data, trends, and facts [updated for 2024]. https://www.varonis.com/blog/ransomware-statistics

    Cobalt. 2023. Top Cybersecurity Statistics for 2024.  https://www.cobalt.io/blog/cybersecurity-statistics-2024

    read more
    less

    UAT Kicks Off Cyber Security Awareness Month with Insightful Panel


    University of Advancing Technology hosts information protection panel with industry leaders to discuss the latest trends in cyber security Cyber Security Awareness Month On October 2nd, the University of Advancing Technology...

    University of Advancing Technology hosts information protection panel with industry leaders to discuss the latest trends in cyber security

    Cyber Security Awareness Month

    On October 2nd, the University of Advancing Technology (UAT) launched its Cyber Week in celebration of Cyber Security Awareness Month with an engaging panel discussion moderated by Robert Walker, UAT’s Director of Community Initiatives. The panel featured a diverse group of experts and students, each contributing valuable insights on the state of cybersecurity.

    Meet the Panelists

    • Dara Gibson, President of InfraGard Arizona, emphasized the critical role of industry connections in securing essential infrastructure.
    • Dr. Briant Becote, UAT Professor and Navy veteran, brought international experience in cybersecurity from his time serving as Director of International Affairs in Egypt and Qatar.
    • Aaron Rodriguez, UAT Cyber Security Professor and 11-year Air Force veteran, shared his deep expertise in technology and security solutions.
    • Christopher Alsay, a UAT undergraduate Network Security student, and Kyle Suttie, a former Game Design student now Cyber Security Graduate student, offered a fresh perspective from their hands-on experiences at UAT.

    078A5524

    Exploring the Cyber Threat Landscape

    The conversation opened with a focus on the most pressing cybersecurity threats facing organizations today. Dara Gibson stressed the importance of education and training, noting that no matter the sector, robust training and network segmentation are essential to building strong defenses. Dr. Becote added a thorough explanation of zero trust security and why it is so crucial that users take dominion over their data, from auditing what emails come in their inbox, to reviewing their credit report regularly for abnormal activity.  

    The panel explored how industries can work together to enhance cybersecurity, highlighting how technology’s rapid evolution demands cooperation. Artificial intelligence (AI) was a major talking point, with the group discussing how both attackers and defenders are leveraging AI to gain the upper hand. While AI offers powerful defense capabilities, ethical concerns surrounding its use in cyberattacks remain a crucial consideration.

    Cyber Security Passion

    Shaping the Future with Practical Education

    The discussion concluded with a look at how UAT is preparing the next generation of cybersecurity professionals. Unlike traditional approaches that rely heavily on theory, Christopher and Kyle asserted that as a UAT student, they learn through practical, hands-on applications, equipping them to meet the growing demands of the cybersecurity landscape. Professor Rodriguez corroborated these claims noting that and listing the items he teaches in his course from ethical hacking to offensive penetration testing.

    This panel provided an excellent kickoff to UAT’s Cyber Week, sparking important conversations about the future of cybersecurity and the role education plays in shaping it

    To learn more about you can secure your cyber security future, visit University of Advancing Technology.

    read more
    less

    Revisiting Innovations with H@xc0rd


    From the University of Advancing Technology’s (UAT) humble beginnings in the 1980s to its present-day status as an innovation hub, many Student Innovation Project (SIP) concepts have been hatched and brought to fruition here. Some SIPs continue to be developed after graduation, exemplifying the spirit of creativity and...

    From the University of Advancing Technology’s (UAT) humble beginnings in the 1980s to its present-day status as an innovation hub, many Student Innovation Project (SIP) concepts have been hatched and brought to fruition here. Some SIPs continue to be developed after graduation, exemplifying the spirit of creativity and technological advancement that defines UAT. Other SIPs prove to be the perfect launching pad to propel the student into their future careers—which was certainly the case for Bradley Chavis, a 2021 dual-major graduate of the Advancing Computer Science and Network Technology (now offered as Network Security) programs.

    Bradley’s SIP, H@xc0rd, was a simple yet powerful Discord bot designed for utilizing common network security tools without requiring any knowledge of Linux.

    H@xc0rd's tools ranged from exploitation to reconnaissance, including Hashcat, Hydra, Nmap, Shodan, and many more. Each tool had its own custom-built help section to guide users on understanding what the tool was, how to use it, and how to interpret the results. Since many tools within the project could be intrusive to the local network it was hosted on, the bot owner could adjust who had access to which tool at any time, significantly limiting the chance of misuse.

    Using H@xc0rd on the server it was hosted on was even simpler, as only a Discord account and basic knowledge of the platform would be needed. To use the bot, one simply had to use the specified prefix found in the packaged sub.js file and the command they wanted to run. For example, a “!ping” command would provide the bot's latency.

    Users could crack a password hash with Java Ripper and showcase the results to everyone on the server without needing to export and share files repeatedly. Additionally, they could find out how many times a particular password had been compromised using the “!haveibeenpwned” command, which queried the Have I Been Pwned database and displayed the results.

    To see all available commands, users could simply use the “!commands” function, which listed approximately 15 tools implemented in the project. Bradley Chavis and his project partner, David Austad (Network Security alum), consistently updated the tools within the project, removing and replacing them as necessary to ensure relevance.

    If a tool wasn’t implemented but was desired, users had the freedom to add it themselves. H@xc0rd was built to allow new tools to be implemented in a matter of minutes.

    One significant challenge during the project was making H@xc0rd run on systems other than Linux. Initially, it only ran on Linux, which conflicted with the goal of universal accessibility. The solution was Docker, a virtualization platform that allows Linux environments to run on systems that wouldn’t typically support them, such as Windows or Mac OS. Docker’s implementation enabled H@xc0rd to be hosted on nearly any operating system, with an install script to handle any issues.

    The project aimed to be as user-friendly as possible, with install scripts automating the setup process on most Linux systems. This ease of setup ensured that anyone could start using H@xc0rd quickly and efficiently.

    “You will never be limited with what you can do with this project, only by your imagination,” Bradley said back in 2021 of the project.

    Through H@xc0rd, Bradley brought advanced network security tools to users' fingertips with ease and accessibility, revolutionizing how these tools could be used on Discord.

    And even more than that, Bradley learned so much in the production of his SIP that he was able to gain a coveted network security job after graduating from UAT in 2021.

    Leveraging a security intern position at Netskope that he completed during his time as a college student, Bradley started a new position as a compliance analyst for the company directly after graduation. He has remained at Netskope since then and has already received two promotions in that time. Today, Bradley is a Security Analyst II for Netskope and is nearing his four-year mark with the company. His success demonstrates what can be achieved with a UAT education!

    Embark on Your Academic Adventure at UAT

    Did this student’s story ignite your interest in UAT? Now is the ideal time to inquire further or even apply for admission! Whatever stage you are at in your academic journey, UAT’s approachable Admissions and Financial Aid teams are ready to provide support and assistance. Step into your future by connecting with us today

    read more
    less

    Enforcing a New Standard for Security


    A Network Security and Technology Forensics dual-major, Christopher Perme was lucky to have a Student Innovation Project (SIP)...

    A Network Security and Technology Forensics dual-major, Christopher Perme was lucky to have a Student Innovation Project (SIP) idea spark from his personal circumstances.

    What was less lucky? That inspiration arrived with a dilemma: After ordering a custom-built PC worth thousands of dollars, Chris was devastated to see his desktop arrive in Arizona in an absolutely demolished state. Having clearly been dropped at some point enroute, the water-cooled case broke and the liquid within destroyed all components of the PC. Chris realized there was a need for a more secure and protective way to ship expensive electronic devices, which inspired him to develop Enforcer, a new shipping solution that ensures security of high-value hardware in transit.

    Equipped with a Raspberry Pi 4, a micro 128GB SD card, an O-ring, and an automatic pressure release valve, the Enforcer is an impressively designed shipping container. Material within the Enforcer is protected from the elements with its airtight seal and thermal resilience. Additionally, opening the Enforcer trips a magnetic switch which triggers video surveillance from within the case. This makes the Enforcer ideal for transit of precious goods, as the user can view footage from the shipping container and investigate any foul play later with video surveillance.

    Enforcer-Inbody-1Chris initially intended the Enforcer for desktop computers. However, as he worked on it and explored various storage methods, he realized the case could securely ship any item while providing security footage.

    Chris has come a long way from his hometown of Garettsville, Ohio to UAT’s Tempe campus. It proved a fortuitous move, though, as Chris finds the campus to be the perfect backdrop for aspiring innovators.

    “For starters, any resource that you could possibly imagine—it's here,” Chris explained. “All on-campus technology is updated regularly, whether it's a VR machine, or a 3D printer, or some form of network security software. It's all provided for students to get to experiment with new technology without breaking the bank.”

    Chris chose to transfer to UAT after an injury ended his football career at Marietta College in Ohio. Wanting to switch his focus from athletics to academics, he applied to UAT on the advice of some family members who are also UAT alumni. Semesters later and now well settled in, the community at UAT has proved invaluable to Chris almost as much as the resources.

    “Here at UAT, if you ever need a helping hand, you can walk in the hallway, say, ‘Hey, I might need help later with something,’ and chances are that they're going to reach out to you before you reach out to them,” Chris said. “There's always somebody willing to help whether they’re a professor or a student. And that's something that's really hard to come by—especially nowadays.”

    Chris collaborated with James “Glenn” Truett, a Digital Maker and Fabrication and Robotics and Embedded Systems dual-major at UAT. Glenn contributed to more of the physical elements of Enforcer, such as developing schematics and assisting with 3D printing, soldering, and wiring needs for the project. UAT faculty were also helpful, with Chris being particularly grateful to Professor Dapzury Valenzuela, who oversees the SIP-related courses.

    Enforcer-Inbody-2In just a few more semesters, Chris will graduate with his degrees, and plans to then return to Ohio. He says he’s eager to find an entry level network security position to get his start at a company where he can use his knowledge and skills to excel. Or, with the demand for network security and technology forensics majors, perhaps land a role he can “grow into” with mentorship and on-the-job learning. He’s keeping an open mind to possibilities but feels confident that the skills he’s learned at UAT will help him wherever he goes as long as he embraces opportunities for continuous learning.

    “You learn something new with every job you're at, regardless of if you like it or not,” he said. “Every experience is a learning opportunity.”

    Embark on Your Academic Adventure at UAT

    Did this student’s story ignite your interest in UAT? Now is the ideal time to inquire further or even apply for admission! Whatever stage you are at in your academic journey, UAT’s approachable Admissions and Financial Aid teams are ready to provide support and assistance. Step into your future by connecting with us today.

    read more
    less

    Inside the UAT Production Studio Experience: Where Ideas Become Industry-Ready Projects


    What is UAT Production Studios?  University of Advancing Technology (UAT) offers a unique differentiator for its students called Production Studios, a class designed to create a real world, industry project experience....

    What is UAT Production Studios? 

    University of Advancing Technology (UAT) offers a unique differentiator for its students called Production Studios, a class designed to create a real world, industry project experience.

    "The UAT Production Studio course allows students to learn and apply the steps, practices, and processes linked to technology project creation. Through the class, students take on the roles and procedures of teams working in production pipelines that mirror the workplace,” says Derric Clark.

    Clark is UAT's Game Studies Program Chair and has been an integral part of UAT Production Studio since its conception and has significantly influenced its evolution to where it is today. Clark currently runs the curriculum and class for Production Studios for all UAT students. 

    T. Lynn Understiller, UAT Professor for the Game Art and Animation and the graduate courses for the Game Production and Management master's degree, was also an integral pioneer for UAT Production Studios, launching it as UAT Game Studios in 2011 and offered to only game studies majors at the time.

    Understiller stated, “UAT’s Production Studios has led students through the job process beginning each semester with the Game Job Fair where students are recruited onto Greenlighted team projects and take on owning and managing their teams on their own while working with professional outside stakeholders. UAT Studios has become one of the University’s greatest assets and has been adopted by all programs of study.” 

    0623_ProductionStudios_Murphy

    Fostering Innovation from Students and Industry  

    Following each semester’s Student Awards Ceremony, an event called ‘Greenlight’ takes place where students and external industry clients can pitch projects to become teams for the following semester’s Production Studios class. Projects can be in any stage of development, from idea to fully functioning business, such as Grab The Axe and FABRIC.

    For Greenlight, any UAT students have the opportunity to pitch and manage their projects, as well as engage with external projects involving real clients and diverse personalities. They often are able to have a graduate student on their team to help with project management, or interact with alumni who contribute to the studio enhances networking opportunities. Additionally, the class mimics an incubator for launching companies, empowering students to hire interns and further contribute to the industry. Overall, Production Studios not only inspires students but also serves as a technology nexus connecting various UAT classes, enriching the educational experience and culture for all students.

    UAT Production Studio

    What to Expect in the UAT Production Studios Courses

    The Production Studios class at UAT offers a comprehensive array of benefits for students. Through this course, students not only create high-quality completed works but also develop expertise in production and discipline. By collaborating with teams, they witness the fruition of a collective vision, gaining valuable experience in team leadership and mentorship. The class experience facilitates collaboration between online and on-ground students, fostering a dynamic learning environment. Moreover, students are immersed in real-world industry expectations, honing both soft and hard skills essential for success. 

    Students are required to take at least two sessions or semesters of Production Studio and in each, they work toward the creation of market-ready, professional applications of technology. This class typically is part of a UAT student’s curriculum in the final four semesters, alongside Student Innovation Project (SIP), Internship, Boards and Portfolio courses. All classes combined pull together the culmination of a student’s unique accolades and achievements, readying them to be able to present and articulate their skills to the world. 

    UAT Production Studio

    Major components and priorities of the UAT Production Studios course include: working together as a team to accomplish completed works, creating opportunities for students to demonstrate mastery for their chosen fields, have industry-relevant projects Portfolio Works to showcase to the industry and prospective employers, as well as create innovative projects for the industry that solve real-world problems. 

    Course objectives for UAT Production Studios includes: 

    •    Collaborate with all team members to develop a project and progress it to the next major milestone. 
    •    Design and implementation of all necessary features, functions, and assets. 
    •    Develop cross-disciplinary and leadership skills using industry-standard management systems and tools, team, and project management techniques which includes interfacing with external QA teams, and creating supporting documentation that provides detailed specifications of all features and content, as well as a record of the project’s development.
    •    Project’s progress is presented at the end of the semester.

    UAT Production Studio

    The UAT Production Studio Experience According to Students

    Alexis Sloan, UAT Network Security Alum and Brooke Cayce Scholarship award winner ran her Student Innovation Project (SIP), STEM For Kiddos, for 3 semesters through Production Studios during her undergraduate time at UAT.

    I enjoy the hands on experience we are able to get in the class no matter what your major is you’re going to get something out of it. I think with the leadership aspect of being in the class, I have learned a lot from how to manage a team, delegate tasks among others, and overall time management skills. Everyone will say communication is the number one thing to have but I also think that the organization through the project is also a major role. It has helped me find ways I work better with a team and how to grow within a team,” says Sloan. 

    Sloan is continuing her education with a Master of Science in Technology Leadership at UAT. She hopes to continue running her project through Production Studios to provide a great opportunity for the UAT undergraduate students to work on a matured, vibrant, and fun student project. 

    0823_SIP-Alexis Sloan-8

    Echoing Sloan's sentiments, Stace Dixon, a UAT Digital Marketing degree alum who ran her SIP, the GENkids app through Production Studios in the Fall semester stated, “Production Studios is comparable to and works parallel to UAT’s Internship experience. Students are getting exposure to what it's like to work in the real world, facing the same challenges organizations deal with every day. I've also seen student projects launch careers if they continue pursuing it after Studios, like Escape Room AR. Production Studios is a unique, foundational, and transformative experience for UAT students to sharpen their career readiness and leadership skills, readying them for the challenges they will face in their future careers." 

    Discover more about Production Studios and other unique and cool courses in UAT’s Course Catalog.

    If you’re ready to take the next step toward a degree and Tech Respect, apply today or schedule a meeting with your Academic Advisor to begin your enrollment process. 

    read more
    less

    The Integration of Drones into Cyber Security Strategies


    You may be surprised, but drones are playing a pivotal role in enhancing network security in several innovative ways. As technology evolves, the integration of drones into cybersecurity strategies has opened new...

    You may be surprised, but drones are playing a pivotal role in enhancing network security in several innovative ways. As technology evolves, the integration of drones into cybersecurity strategies has opened new avenues for protecting digital infrastructure.

    1. Advanced Surveillance and Monitoring: Drones are equipped with high-resolution cameras and other sensors that allow for detailed surveillance of large and remote areas. This capability is particularly useful for monitoring the physical security of network infrastructure like data centers, communication towers, and cable routes. By providing real-time visuals and data, drones help in early detection of physical breaches or tampering that could lead to network vulnerabilities.

    2. Aerial Assessment of Wireless Networks: Drones can be used to assess the security of wireless networks. Equipped with the right tools, they can identify unsecured Wi-Fi networks, detect unauthorized access points, and analyze signal strengths and vulnerabilities. This bird’s-eye view approach enables a comprehensive assessment of network security, which is often challenging to achieve from the ground.

    3. Inspection of Hard-to-Reach Infrastructure: Many components of network infrastructure, such as antennas and satellite dishes, are located in difficult-to-reach areas. Drones can easily access these spots to inspect for physical damages or unauthorized devices that could compromise network security.

    4. Rapid Deployment in Incident Response: In the event of a suspected network security breach, drones can be quickly deployed to the affected site. They provide immediate visual feeds and data analysis, allowing for a quicker response and assessment of the situation.

    5. Testing Network Resilience: Drones can simulate potential security threats to a network, helping organizations test their defenses and response protocols. By mimicking attacks like denial-of-service (DoS) from various locations and altitudes, drones help in strengthening network security measures.

    6. Data Encryption and Secure Transmission: When it comes to handling sensitive data, drones equipped with secure communication links and strong encryption protocols ensure that the data they collect and transmit is protected against interception and cyber threats.

    Drones offer a unique and versatile approach to network security, extending the reach of traditional cybersecurity measures. Their ability to provide aerial insights, rapid response, and innovative testing capabilities make them an invaluable asset in the ongoing battle against network security threats.

    read more
    less

    Defending Against Blacklotus: UAT's Cyber Security Program Sheds Light on UEFI Attacks


    The Blacklotus malware is a UEFI bootkit that targets systems at one of their earliest points of availability. During the boot process. ESET malware researcher Martin Smolár noted that this begins with executing an installer that deploys the bootkit files to the EFI system partition, disables the HVCI and BitLocker protections, and reboots the host....
    The Blacklotus malware is a UEFI bootkit that targets systems at one of their earliest points of availability. During the boot process. ESET malware researcher Martin Smolár noted that this begins with executing an installer that deploys the bootkit files to the EFI system partition, disables the HVCI and BitLocker protections, and reboots the host. Legitimate binaries vulnerable to CVE-2022-21894 (Windows Hypervisor Loader, Windows Boot Manager, PE binaries) and their custom Boot Configuration Data (BCD) are then exploited and persistence on machines with UEFI Secure Boot enabled is achieved after the initial reboot by exploiting CVE-2022-21894 and installing the attacker’s Machine Owner Key (MOK). A self-signed UEFI bootkit is launched after reboot and the malicious kernel driver and an HTTP downloader are deployed. This will allow the attacker to complete the installation of the attack.
     
    This is particularly devastating because most users are unfamiliar with the boot process, UEFI, and most of the underlying software and firmware that the system uses to support operations. This means that attackers are going to target the computer in places where the average user is neither going to know how to fix nor even identify the vulnerability. Most users are unaware of how much computing power exists below Ring 0 and lives tucked away from the user space, and this is exploited by more technically savvy attackers.
     
    However, individuals enrolled in our cyber security program at UAT are exposed to UEFI, boot loaders, and even systems like Minix which are used at the heart of many computers today. By being exposed to these tools early on in their development as cyber security students, they are able to identify or defend against some of these attacks. The most important aspect being the identification of and ability to respond to these types of issues.
     
    __________________________________________________
     
     
    Professor Jones is the lead Cyber Instructor at the University of Advancing Technology and is a software developer who currently creates applications for law enforcement. He is also an AZ Peace Officer Standards and Training certified General Instructor as well as a public speaker. He earned a BS, in Computer Information Systems from Park University in 2013 and an MA, in Intelligence Analysis with a focus in Cyber Security in 2014. Professor Jones has been the recipient of recognition from the El Paso Police Department, State Of Texas, Texas Military Forces, Chandler Police Department, and others.

    Professor Jones is also active in the community as the founder of the Phoenix Linux Users Group Cyber Security Meetup and regularly teaches members of the public a myriad of topics related to Cyber Security. His audience includes students, teachers, law enforcement, military, government officials, and concerned members of the public with a strong desire to learn what is going on in the world of technology.
     
     
    read more
    less

    What is Kali Linux?


    Kali Linux, formerly Backtrack Linux, is a Debian-based and open-source operating system distribution with the intention of making penetration test and auditing tools available to the average user. Kali Linux can be installed or otherwise booted up with hundreds of tools preinstalled to make tasks such as forensics and reverse engineering much more accessible to...

    Kali Linux, formerly Backtrack Linux, is a Debian-based and open-source operating system distribution with the intention of making penetration test and auditing tools available to the average user. Kali Linux can be installed or otherwise booted up with hundreds of tools preinstalled to make tasks such as forensics and reverse engineering much more accessible to less technical users.

    Kali is completely free, has an open-source Git tree available, is Filesystem Hierarchy Standard compliant, and supports a wide range of hardware. You can install Kali locally onto hardware or run it from a USB drive as a live distribution and it will typically be highly compatible with numerous additional devices.

     kali linux

    Kali can be used to conduct penetration testing, security auditing, digital forensics, or reverse engineering. The applications installed come from a minimal set of repositories and the goal is to keep upstream software sources to a minimum. The intention being that users can deploy Kali quickly and easily into an environment and get to work with minimal fuss or the need for additional training.

    Remember that Kali was not designed to be a daily driver and installing any unapproved applications is not support. While Kali can potentially make your life easier, it is certainly not designed to be an everyday OS. You will not be able to install games or other out of band software without many issues or problems. Kali fills a very specific niche but if you have need of a system to accomplish your goals, it may do those things very well.


    Earn a Degree in Cyber Security at UAT

    UAT offers a Master’s of Science in Cyber Security, as well as bachelor’s degrees in Network EngineeringNetwork Security, and Technology Forensics. Our Cyber Security Degree for Ethical Hackers and Network Security Curriculum has been certified through the NSA/DHS National Information Assurance Training Program in Information Assurance and Cyber Defense.

    Designated as a Center of Academic Excellence by the National Centers of Information Assurance Education (CAE/IAE), UAT’s Network Security Bachelor’s of Science degree prepares students to take on the ever-evolving world of information security.

    If you believe a career in cyber security may be right for you, request information about our degree programs. At the University of Advancing Technology, we’re passionate about helping students enter STEM fields and acquire the skills they need to land a rewarding career in cyber security and beyond.

    read more
    less

    Running Your Own Email Server


    What is MIAB? Running your own email service provider sounds like a daunting task but it can be made easier by using an array of tools that have been combined into a self-hosted service called "Mail in a box" (MIAB). MIAB turns a fresh cloud computer into a functional mail server,...

    What is MIAB?

    Running your own email service provider sounds like a daunting task but it can be made easier by using an array of tools that have been combined into a self-hosted service called "Mail in a box" (MIAB). MIAB turns a fresh cloud computer into a functional mail server, and you do not need to be a technology expert when setting it up.

    MIAB will assist you in setting up both webmail as well as an IMAP/SMTP server for use with mobile devices and mail software that runs on the desktop. You can also manage your contacts and synchronize your calendar. You get the standard functionality like spam protection, mail filtering, email client auto-configuration, and you can even back it all up to Amazon S3. If you allow MIAB to function as your DNS server you will get access to automatic SPF, DKIM, DMARC, and MTA-STS security.

    email server 2

    MIAB runs awesome on Amazon EC2 instances and by combining the knowledge of the cloud with some basic capabilities to run bash scripts, you can get online very quickly. You will need a domain name and a server, and those costs can be kept very inexpensive by using an affordable provider such as AWS.

    Whether you are concerned about mass electronic surveillance or want to contribute to the decentralization of the web, it is possible that a tool like mail in a box could provide you with the simplified tools you need to accomplish your goals. For more information about this topic, check out these resources: https://mailinabox.email/ and https://sealedabstract.com/code/nsa-proof-your-e-mail-in-2-hours/ .

    SECURE YOUR FUTURE WITH A CYBER SECURITY DEGREE

    UAT offers a variety of degree choices, from associate to master degree options. Don't wait. Apply now!

    Explore UAT's cyber security degrees: 

    read more
    less

    What is a Password Manager?


    Forgot Password? A password manager is a tool that is designed to manage many passwords in a secure and easy to access manner. Using a single password for all your accounts increases the likelihood that you will be breached over many accounts by a large percentage. It is important...

    Forgot Password?

    A password manager is a tool that is designed to manage many passwords in a secure and easy to access manner. Using a single password for all your accounts increases the likelihood that you will be breached over many accounts by a large percentage. It is important that you use a strong password that is not easily guessed on each account, and this is best facilitated not by trying to remember your passwords but instead by deploying the technology necessary to make this a trivial exercise.

    Google Online Security Survey found that 52 percent of all the individuals who responded to them reused the same password for more than one account. That means, if you provide this password to a company that is breached, you can now expect that password to be included in brute force lists and eventually to be used to break into your accounts. Reducing the likelihood that a compromised, weak, or reused password will be used against you starts with the use of a password manager.

    Password Body

    You have many choices when it comes to password managers. You can deploy something self-hosted or use a password manager provided by a company. While we do not recommend any password manager, we will mention that SAASPASS, an application available over several devices provides the ability to store passwords as well as manage One Time Password tokens, tremendously reducing complexity. Finding something that meets your needs, is easy to use, and secure can be difficult but the features provided by any password manager are typically parallel and only the service and support of the company as well as price will typically differ.

    By using a password manager, you will no longer need to memorize all your passwords. You can automatically generate a secure password using built in tools. You can also leave your master password in your personal documentation in the event of your death to facilitate your digital inheritance. All these benefits make your life easier, more secure, and safer.

    Even if you do use a password manager, do not forget to use a complex and original password per account, enable two factor authentication, and think about how you will recover accounts in the event you lose a device. Your security begins with practicing best practices related to cyber security.

     


    SECURE YOUR FUTURE WITH A CYBER SECURITY DEGREE

    UAT offers a variety of degree choices, from associate to master degree options. Review the programs available here. Don't wait. Apply now!

    SOC

    read more
    less

    UAT Retires Cyber Warfare Range, Introduces SOC


    UAT Adds Security Operation Center After more than 10 years, University of Advancing Technology (UAT) retired its Cyber Warfare Range and in August 2021, added its own Security Operations Center (SOC), where students can work alongside mentors...

    UAT Adds Security Operation Center

    After more than 10 years, University of Advancing Technology (UAT) retired its Cyber Warfare Range and in August 2021, added its own Security Operations Center (SOC), where students can work alongside mentors to learn how to manage SOCs for virtually any organization. Security Operations Centers are important for any organization looking to decrease cyber threats and attacks. It is a central hub in charge of predicting, assessing, and taking action against cyber threats, as well as working to prevent them altogether. This center is available to all students, but it is most pertinent to Network Security, Cyber Security, Network Engineering and Technology Forensics majors.

    What is a SOC and Why Do We Need One?

    Security Operations Centers are 24-hour security hubs that work to increase the level of cyber security within an organization. Security engineers and analysts work in SOCs around the clock to analyze, prevent, and ultimately stop cyber attacks. Cybercriminals will attack at any time of day, which makes these centers so important to an organization's cyber security.

    SOCs are essential to every organization, UAT being no exception. The benefit of having a SOC at the university is that students can get hands-on experience and training in a place not unlike one they could work in after graduation. Students with an interest in Cyber and Network Security get the opportunity to assess and address cyber threats in real-time. Working at UATs SOC can make your resume stand out amongst other college graduates who weren’t afforded the same opportunities. At UAT, we believe everyone should get the experience they need before they even graduate.

    The main feature of the SOC is the ability to connect to UAT's virtual machine cluster. This gives student the ability to interact with any operating system as long as they have the have the ISO file for it. Another benefit of the virtual machine is the ability to restore the state of the virtual computer once you take a snapshot. For example, students can run malware on a virtual machine and observe it. Then when they're done, they can examine the damage and can revert it. They are able to go back to the stage before the malware had been run. Cyber Security Associate Professor Jeremy Bunce adds, "Templates of virtual machines can be made, allowing me as an instructor, to create 15 Windows computers for my students to use in a class. Or have a virtual machine with misconfigurations that the students could get hands on practice fixing."

    UAT_Network_Security_SOC

    What Happens in a SOC?

    The functions and occupations of a security operations center can be boiled down to five major tasks: monitoring, response, remediation, consistency, and context. 

    1. Monitoring is tracking of cyber threats or potential threats. 
    2. Response is reacting to, and fixing said cyber threats and attacks. 
    3. Remediation is assessing current security operations and finding weak points. 
    4. Consistency is maintaining a security operation and abiding by it in an ethical way.
    5. Context is determining specific functions and needs of an organization that a SOC team can fulfill.

    Professor Bunce explains, "The SOC is used by student to do their homework so they can practice hacking without risking their own computer." He adds, "The SOC is typically not used by non cyber students since it normally requires them to take a network security class to gain a login. Faculty can use the SOC to set up virtual machine to either demonstrate an exploit or set up a lab for them to work on."

    "We have hosted Cyber Patriots here in the SOC," Bunce shares about community involvement in the SOC. "It’s a network security competition for high school students where they compete against other schools. They use our room for both doing the competition and hosting their training in the SOC." 

    There are also events held in the SOC, such as Capture the Flag and Red v. Blue. If you are new to cyber security, these are competitions held for students that give them hands-on experience in real world settings. Bunce explains what Capture the Flag is, "You are given a task and need to complete it which results in you getting a file that is called a flag. Some examples of task are decrypting a text to get the original text or using a computer exploit to gain access to it and downloading a file called flag.txt." Students take part in these to not only learn the skills, but to be able to preform under pressure.

    There are many benefits to having a SOC, but one of the most important benefits is the students having access to a setup like this. As mentioned before, the SOC replicates SOCs they will encounter in the real world, assuring they are prepared once they graduate. Students can make virtual machines that meet an industry standard SOC. This allows the students hands-on practice and the ability to revert changes if they make a mistake. "Another aspect of our virtual machine cluster is that each class has a private network. This allows an installing windows server class and an ethical hacking class at the same time without them interfering with each other. This also allows for Capture the Flag competitions to be run on the virtual machine cluster. There is also the added benefit of having a room dedicated to network security for students to set up collaboration or work on projects together," shares Bunce. Along with the hands-on learning experience, students have access to a PowerEdge T340. If you aren't familiar with what it is, it is a mini server with two monitors.

    UAT_Jeremy_Bunce_CTF

    How Can I Get Involved?

    Contact an advisor or a professor for more information on getting involved with the SOC. Working at the SOC can be a great way to build your resume and gain workplace experience. UAT is excited about this recent addition to the campus and encourages students to look into it.  Become a part of the solution today and get hands-on experience dealing with real cyber threats and attacks and maintaining security procedures.

    read more
    less

    Tim Roemer Presents The Five Cs of Cybersecurity to UAT Students & Community


    Technology is the life force of University of Advancing Technology (UAT). Fostering technology discussions and exploring the edge of innovation are what UAT does best. In spirit of advancing technology, UAT constantly invites guest speakers to...

    Technology is the life force of University of Advancing Technology (UAT). Fostering technology discussions and exploring the edge of innovation are what UAT does best. In spirit of advancing technology, UAT constantly invites guest speakers to visit campus to impart wisdom, facilitate discussion and provide networking opportunities and community connections with students.

    Tim Roemer, a 2022 UAT Honorary Doctorate recipient, visited campus to speak with students about the State of Arizona's Five Cs of Cybersecurity. The five Cs include culture, communication, collaboration, conviction and consistency. Before presenting to all of UAT and the community, he held a private luncheon for cyber security students, allowing them to dive deep into their cybersecurity questions.

    “I can tell you from real world experience that, unfortunately, there are still myths out there at senior levels of government and law enforcement about cybersecurity. People still throw the term cybersecurity out when they just mean general technology. But we’re going to take it because it gives us momentum.”

    Tim Roemer was appointed by former Governor Ducey in April of 2021 as the Director of the Arizona Department of Homeland Security. Director Roemer advised the Governor on a wide range of topics including cybersecurity, border security and counterterrorism.

    Director Roemer also manages cybersecurity for the State of Arizona as the State’s Chief Information Security Officer (CISO). As State CISO, Director Roemer leads the State’s cybersecurity team, sets cybersecurity strategy and defends the State against evolving cyber attacks that threaten citizens' data and Arizona’s critical infrastructure. Through consistent vigilance of culture, communication, collaboration, conviction and consistency, Director Roemer will help Arizona improve cybersecurity resiliency.

    “My team has regularly scheduled calls with technology leaders in the State to update them on what to be on the lookout for and what we are blocking at a state level. For the longest time, one of the biggest things criminals were utilizing in phishing emails were COVID heat maps, so it was like 'click here for a heat map of COVID cases in your community' and that's how they were getting a lot of government employees to click on the phishing emails.”

    Director Roemer’s career is quite impressive. He has served the State of Arizona in a variety of leadership roles prior to his current appointment. This includes four years in a dual role as the Governor’s Public Safety Advisor and Deputy Director of the Arizona Department of Homeland Security, one year as the Governor’s Deputy Director of Legislative Affairs and two years as the State’s CISO. Director Roemer has served on numerous Boards and Commissions including the Arizona-Mexico Commission’s Security Committee and the Human Trafficking Council since the beginning of former Governor Ducey’s Administration in 2015.

    "Recently, the human trafficking counsel has been asking my team for some help because my team is naturally very good online They're better than most criminal investigators, they can find things out a lot faster. They can write rules for things and consolidate information a lot faster."

    Director Roemer served in the Central Intelligence Agency for 10 years before working for the State of Arizona. The final two years of his CIA career were spent assigned to the White House Situation Room, where he provided critical national security updates to the President, Vice President and National Security Council. In this role, he was responsible for briefing senior U.S. policymakers on a broad range of national security-related issues.

    Director Roemer supported the CIA mission at its headquarters in McLean, Virginia in addition to his time in the West Wing. Over his decade-long career in the U.S. Intelligence Community, he also completed assignments at the National Geospatial Intelligence Agency and the National Reconnaissance Office.

    It was a great event that helped showcase to students the vast ways their careers in cybersecurity could go. At UAT, it's important to for us to introduce students to the real world possibilities of their future. This event granted them the ability to pick the brain of a very successful cybersecurity professional.

    read more
    less

    Cybersecurity: the 6th C of Arizona


    Students Gain Industry Insight from Director Roemer On Monday, October 3, 2022, students, staff and faculty welcomed Director of the Arizona Department of Homeland Security, Tim Roemer, to ...

    Students Gain Industry Insight from Director Roemer

    On Monday, October 3, 2022, students, staff and faculty welcomed Director of the Arizona Department of Homeland Security, Tim Roemer, to University of Advancing Technology (UAT). Director Roemer was as energetic as he was insightful during his campus visit. Starting off the day, cyber students were invited to an intimate lunch where they could ask Director Roemer questions, gain insight from his experience and hear some funny stories that reminded everyone it's okay to not know everything about every thing.

    Network Security and Network Engineering student, Tyler Prettyman, shares his experience from the day. "Getting to meet Director Tim Roemer is something I am very thankful for. I feel very lucky as a student to get insight about the industry from such a high ranking government official. Not only was Director Roemer very knowledgeable, he was very friendly and fun to talk with."

    Prettyman continues, "One of the takeaways from my conversations with the director was that connections are everything. Networking with good people can lead to great opportunities. Another topic that he talked about was how to bring cybersecurity to the general audience—it was very interesting on how he did it with his own team. I feel as some of his insights and recommendations will stick with me for awhile."

    TimRoemerLunch

    After the lunch, Director Roemer presented to all students, faculty, staff and the community about the 5 C's of Cybersecurity, different from the 5 C's of Arizona, which he tested everyone on (we passed!). Roemer added, "I always say cybersecurity is the sixth C of Arizona." Before getting into the five C's, he shared what it was like when he was starting out. He was first exposed to how important cybersecurity was back in 2012 when nation-states were attacking the US financial sector—they were targeting banks, attempting to shut them down. "Cybersecurity was growing in its demand of policy makers to pay attention to it, but not a lot of people had a lot of experience in it," explained Director Roemer.

    Director Roemer was great at being transparent and sharing with the students the reality of getting started in, not just cybersecurity, but any field. "From day one it was like drinking out of a fire hose. Figuring out working with experts, how for me to be a generalist, and to bring it to a level that I really understood the nuances of cybersecurity," he continued, "and how the state was going to move ourselves forward." As he explained the progression of his role, his experience also touched on the first C of Cybersecurity. Director Roemer discussed culture, "The first thing I knew we had to do was create a culture of cybersecurity awareness. We mandated annual cybersecurity trainings for all 36,000 state of Arizona employees immediately."

    5 Cs of Cyber

    He described the different groups who are the biggest threats to cybersecurity: nation-states, criminals and hacktivists. People asked him what keeps him up most at night, and he replied, "Probably the criminals. When people are actually stealing your data, now you've got a huge problem, and the criminal networks have proved that's where they want to go. Cybersecurity knows no borders." Moving right into the fourth C of Cybersecurity, Director Roemer discussed convictions. "Actually making cybersecurity incidents into a prosecutorial issue. These events are crimes and someone needs to be held responsible." He continues, "This is not a victimless crime. You cannot get away with this anymore. We have to prosecute the cyber criminals that are out there. We need to build cases with law enforcement, and make examples out of them."

    The fifth C is consistency, which Director Roemer mentions is short and sweet but necessary. "You can do all those things [the four other C's of cybersecurity], but you can't do them once. You have to do them all day, every day, 24/7, 365." After wrapping up the 5 C's, there was a question and answer portion where Director Roemer went into more detail about his time working with the White House, his thoughts on current events and what the best advice for students is. He stressed the importance of networking in the cybersecurity field for current and future students. Ending the educational day, with a campus tour, starting with UAT's Security Operations Center (SOC), where Director Roemer said he's "been incredibly impressed."

    Sam Roethemeyer, a Network Security student, reflects on the day. "It was really insightful to hear from not only a professional in the industry but from the director of the Arizona State Department of Homeland Security. As someone who currently has an internship with the Arizona Department of Economic Security, specifically with the Security, Risk, and Compliance team, it was reassuring to hear from him about some of the difficulties they have had because they match up with some of the difficulties my team has had. I also went to the lunch with him, so we were able to get a little more personal. We picked his mind for a bit, and he gave us some tips on career business in cybersecurity. When you think about someone in his position, you would think they would be a lot more intimidating, but he was down to earth, friendly and very approachable. He told us his path through his career, and it is amazing at how time and opportunities lined up so well for him to end up in the position he is in now."

    TimRoemerSOC

    Earn a Degree In Cyber Security at UAT

    UAT offers a Master’s of Science in Cyber Security, as well as bachelor’s degrees in Network EngineeringNetwork Security, and Technology Forensics. Our Cyber Security Degree for Ethical Hackers and Network Security Curriculum has been certified through the NSA/DHS National Information Assurance Training Program in Information Assurance and Cyber Defense.

    Designated as a Center of Academic Excellence by the National Centers of Information Assurance Education (CAE/IAE), UAT’s Network Security Bachelor’s of Science degree prepares students to take on the ever-evolving world of information security.

    If you believe a career in cyber security may be right for you, request information about our degree programs. At the University of Advancing Technology, we’re passionate about helping students enter STEM fields and acquire the skills they need to land a rewarding career in cyber security and beyond.

    read more
    less

    6 Things to Know Before Choosing Network Security as Your Major


    What to Consider Before Earning a Network Security Degree Threats to network security only grow as technology advances. While network security professionals are staying up to date on the latest cyber threats, cybercriminals are working on new ways to...

    What to Consider Before Earning a Network Security Degree

    Threats to network security only grow as technology advances. While network security professionals are staying up to date on the latest cyber threats, cybercriminals are working on new ways to stump professionals. This means that the need for network security professionals is expanding daily. Not only are network security professionals needed to create the most secure network possible, but they must also be prepared to counterattack any unauthorized users. 

    A degree in Network Security could help you protect other people’s information in a world where it’s normal to entrust data to online networks. University of Advancing Technology (UAT) explains, “Network security utilizes proactive techniques, including defense-in-depth and layered security, to mitigate or eliminate vulnerabilities in information systems and to protect against potential exploitation." 

    This means that network security is important for corporations that store company and personal data online. It’s more efficient to store information digitally, but digital data can be breached, which is why network security is so important. It puts up cyber walls to impede cyber criminals from accessing people’s information. 

    network_security_degree_UAT2

    UAT's Security Operations Center (SOC) where various Cyber Security courses are held and students can utilize it as a workspace. 

    Here are six questions you may be wondering as you decide whether or not a Network Security degree is right for you.  

     

    1. What is a Network Security Degree? 

    A degree in Network Security is a specific Bachelor of Science degree within the Cyber Security curriculum that prepares you for a career in the network and information security field. At UAT, this degree offers the student real world experience and invaluable problem-solving skills training. 

    To appropriately prepare students for the ever-growing world of cyber security, this degree is one of UAT's more rigorous and sought after degree options. Fortunately, careers in network security can also be lucrative for those with a degree. 

    2. Is a Network Security Degree Worth It?  

    An undergraduate degree in Network Security from UAT offers graduates the opportunity for a career in a potentially lucrative field that is exponentially growing in demand for cyber security talent. There are several career opportunities to choose from, making this degree versatile and consistently necessary. Currently on LinkedIn in 2022, there are over 170,000 jobs listed for network security in the United States. So, a degree in Network Security is worth it in the sense of opportunity and potential growth outlook. 

    At UAT, courses are offered year-round. Therefore, full-time students can graduate in 2.8 years. You can also earn your master’s degree in Cyber Security in less time. A master’s degree in Cyber Security will potentially set you up for better job opportunities within leadership and management careers, and potentially a higher salary. While a master’s degree is not required for a successful career in network security, it can provide even more opportunities for graduates. 

    network_security_degree_UAT6

    UAT students and professors meeting in the Security Operations Center. 

    3. Does a Network Security Career Path Have Job Security? 

    Everyone providing online data needs network security. In 2022, cyber threats are more prevalent than ever, and they will only continue to grow. Strong network security can protect data from being breached. Data can come from many different places, and most of the time, releasing it is unintentional. Network security protects even the most unintentional actions from being exploited. Strong network security professionals can also fight back against these attacks, should they occur. The goal is prevention, but the job is protection. A degree in network security gives a graduate both of these skills.  

    4. Do I Need a Network Security Degree to Get a Job in Network Security? 

    While it is possible to earn a career in network security without a degree, your chances of gaining the most up-to-date and valuable information are severally threatened. You are also less likely to receive the higher salaries that network security professionals with a degree receive. Thanks to the internet, there’s a wealth of free information out there to take advantage of, but that information will only take someone so far. You also run the risk of receiving inaccurate information if it’s from an outdated or non-accredited source. A degree is the most surefire way to get the skills, mentorships and connections you need in order to achieve the career you want. 

    Industry expert and UAT’s Program Chair of Cyber Security, Aaron Jones says, “The Network Security degree is valuable because it functions as the litmus test necessary to enter the job market."

    Professor Jones goes on to explain, "It is common for influencers and even news organizations to make wild claims about how technology is an open career path that requires little or no education. The truth is that many jobs do and will continue to require a degree to enter, and some of the most lucrative career paths will continue to require higher education for admittance.” 

    The job market for cyber and network security is extremely competitive as everyone wants to have the best protection for their private data. A degree in Network Security will give a graduate the chance to properly compete for a network security career of their choosing. 

    network_security_degree_UAT5

    UAT Cyber Security Professors, Aaron Rodriguez and Jeremy Bunce observing students meeting in the UAT Security Operations Center. 

    5. Career Outlook for Network Security? 

    According to the U.S. Bureau of Labor Statistics, the job outlook for information security in 2022 is projected to be around 33%. The average job outlook for most careers is only 8%, making network security one of the fastest-growing job markets. 

    Every time a company is created, they need some level of network security to protect data. Whether it’s a customer’s data, their own, or important financial information, it’s invaluable to make sure it’s protected.  

    6. How to Choose a University with a Network Security Degree

    If you’re asking yourself where to earn a Network Security degree, you’ve come to the right place!  

    UAT is accredited by the Higher Learning Commission, an institutional accreditation agency recognized by the U.S. Department of Education.

    Also, University of Advancing Technology is a designated Center of Academic Excellence - Cyber Defense Education (CAE-CDE) institution through the National Information Assurance Education Training Program (NIETP). Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS), NIETP operates under national authority as the national manager for cyber defense education and training relating to national security systems. 

    This means that the most valuable and up-to-date technology and teaching methods are provided to UAT Network Security degree students. Students also get the opportunity to synergize their work and apply it, so they go into their chosen careers with experience already under their belt. UAT places a high value on demonstrated mastery and workplace readiness throughout its curriculum to ensure graduates are prepared for their technology careers. 

    If you think a Network Security degree sounds exciting, or you simply want to know more about it, request information or apply today.

    read more
    less

    UAT Cyber Security Professor Aaron Jones


    Professor Aaron Jones on Studying Cyber Security at UAT University of Advancing Technology (UAT) offers one of the longest-running Cyber Security degrees ...

    Professor Aaron Jones on Studying Cyber Security at UAT

    University of Advancing Technology (UAT) offers one of the longest-running Cyber Security degrees in the Southwest with a complete continuum of undergraduate and graduate degrees. A degree from the University trains students to be some of the best in the field of cyber security, while giving them the freedom to explore other technology disciplines. Professor Aaron Jones explains how mentorship plays a part in this.

    “My name is Aaron Jones and I'm the Program Champion here for the University of Advancing
    Technology for our cyber security group of majors. I have been here for a couple of years now and in addition to that, I also work in the industry as a cyber security analyst for a local law
    enforcement organization. Here at the University of Advancing Technology, you can earn a degree in Technology Forensics, Network Security and Network Engineering or a master's degree in Cyber Security."

    UAT_security_operations_center

    “Every single student is a cyber security ambassador, and it's their responsibility on day
    one to step into the shoes of a cyber security student and eventually cyber security expert. What
    I find with a lot of my students is that there's an overlapping interest. You can explore in a very
    safe environment, so I have students who, while pursuing a cybersecurity-related degree, will
    interact with our game development professors. While not necessarily directly connected to their
    degrees, there are things that interest them and inspire them."

    “What we encourage and what we build on here is developing both that internal network and that internal relationship building of working with your peers. Here within the University of Advancing Technology, mentorship is incredibly important. What I like to do is work with industry partners to make sure that our students are able to go out and participate in things like internships and externships. What I’ve found is that industry partners love that. That's the beauty of the program itself; it's designed for you to come in at any skill level and still learn something, still build, still develop and then still set you on a trajectory in the direction that you want to go.”

    Should You Major in Cyber Security? 

    UAT is a designated Center of Academic Excellence - Cyber Defense Education (CAE-CDE) institution through the National Information Assurance Education Training Program (NIETP). Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS), NIETP operates under national authority as the national manager for cyber defense education and training relating to national security systems.

    If you a natural problem solver, fascinated by information technology (IT) and the protection of privacy, data and more, a cyber security degree might be right for you. Request more information to find out more about the network security degree curriculum, potential outcomes and more. If you're ready to take the next step, apply for acceptance today! 

    Watch Professor Aaron Jones' full video here: 

    {% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True, viral_sharing=False, embed_button=False, autoplay=False, hidden_controls=False, loop=False, muted=False, full_width=False, width='1280', height='720', player_id='86817302417', style='' %}
    read more
    less