Thursday, November 30, 2017

Cybersecurity and the Internet of Things: Tales from the Frontier - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2836

It’s a scenario that many people would prefer not to imagine: you’re speeding down the highway at 70 mph, and an unknown adversary takes control of your car, disconnecting your brakes and eventually crashing you into a ditch.
Two members of the Capitol Technology University Cyber Battle Team participate in a contest.
That’s exactly what happened to Andy Greenberg, a writer for Wired magazine, in 2015. True, the incident did not exactly catch him by surprise: he had volunteered to be a “digital crash test dummy” in an experiment staged by two cybersecurity advocates, Charlie Miller and Chris Valasek. Together, they were out to demonstrate the serious security vulnerabilities associated with internet-enabled entertainment systems, a feature of many vehicles now coming off the assembly line.

With Greenberg behind the wheel of a Jeep Cherokee, the two hackers began to wreak havoc: blasting the interior with frigid air, blurring the windshield with wiper fluid, then disconnecting the transmission and, eventually, the brakes. Even though he was in on the stunt, the writer found it increasingly difficult not to panic – especially as an 18-wheeler bore down on his crippled vehicle.

Greenberg survived to tell the tale, warning that the rush to add internet-enabled features and services is outpacing our ability to secure them from intruders. “Chrysler, like practically all carmakers, is doing its best to turn the modern automobile into a smartphone,” he wrote for Wired.

Hackable cars are only one of the emerging security nightmares arising from the proliferation of internet-enabled devices, or the Internet of Things (IoT), as the phenomenon is commonly dubbed. Across a wide spectrum of industries, companies are eager to harness the capabilities – and, in many cases, the potential cost savings – that come with an IP address.

The result, too often, is a wide-open back door for cyber criminals and a raft of unsuspected consequences for businesses and consumers.
Cyber Battle Team members watch a monitor.An internet-enabled HVAC system, for example, was the initial point of entry when hackers compromised the Target Corporation’s internal network in December 2013, staging one of the most infamous data breaches to date. The thieves appropriated domain access privileges and disguised themselves as admins, then tunneled their way into database servers, gaining access to the Personally Identifiable Information (PII) of 70 million customers and stealing 40 million debit and credit card credentials – which they then sold on the black market.

And it all started because of a convenient, cost-saving new feature added to many HVAC systems: network access. Such access enabled the vendor in charge of heating and air conditioning services to remotely monitor energy consumption and temperatures at individual stores.

An expanding attack surface

Staying ahead of the security problems posed by the dizzying array of networked devices is a key priority at Capitol Technology University, long known for its cutting-edge undergraduate, graduate and certificate programs in cybersecurity. The university was among the first to offer a doctorate in the field, starting in 2010.

Today, Capitol continues to upgrade its curriculum and provide new resources in response to quickly evolving trends. The pool of students seeking cybersecurity expertise is changing as well. No longer merely a concern for specialists, cybersecurity is becoming everyone’s business.

William Maconachy, vice president of research at Capitol Technology University and a revered pioneer in the field, believes the general public can no longer afford to remain blissfully ignorant.
Dr. William Vic Maconachy
“Tremendous vulnerabilities are there as a result of our becoming so web-reliant. Web reliant equals web vulnerable,” he said.

While the potential to wreak financial havoc is serious, Maconachy says it’s the implications for personal privacy that keep him up at night.

He cites, as an example, the experience of a friend who installed a home security video system, only to discover that it was being hacked. Instead of providing security to him and his family, the cameras were being used by an outsider to spy on their activities.

“The invasion of privacy is becoming a big thing,” Maconachy says. “It’s not just about thieves stealing money off of your credit card, bad as that is. We’re talking about serious intrusions into a person’s life space.”

Dr. Jason M. Pittman, a professor of cybersecurity at Capitol, sees a cybersecurity arena that is becoming increasingly complex and decentralized.

“The single most pressing area over the next five years will be low-power, embedded devices. These devices will accelerate in their penetration into daily life because of the huge benefit to society,” he said.

Pittman and his colleagues are working to bring about a fundamental change in attitude among stakeholders in cybersecurity technology, including application developers, businesses that offer services, and the consumers that use them.

“We need to massively rethink our approach to developing technology. Improving quality of life and reducing inane burden is the purpose of technology. But we need to begin producing technology that innately includes cybersecurity features,” Pittman said.

 “Secondly, we need to develop a collective ability to move faster when vulnerabilities are announced. Adversaries will always have n+1 steps while we only have n steps. We need to leverage that,” he said.

“We need to evolve a view in which cybersecurity is a baseline attribute.”

Capitol offers cybersecurity degrees at the undergraduate, master's, and doctoral levels. Click here to request information about graduate level programs. For our undergraduate programs, click here.

Wednesday, November 29, 2017

When Personal Data is No Longer Yours: Lessons From the Uber Breach - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2816

It’s a familiar tale by now: a high-profile organization comes forward, well after the fact, to acknowledge that it suffered a cybersecurity breach that affects multitudes of consumers.
But in the latest case – involving rideshare giant Uber – the breach itself may not be the most significant part of the story, argues cybersecurity expert Dr. Jason M. Pittman, who teaches at Capitol Technology University.
On Tuesday (November 21) Uber disclosed that it paid $100,000 to hackers who accessed 57 million users’ personal data in 2016. Uber says the hackers promised to destroy the stolen data, which included names, e-mail addresses, phone numbers, and in some cases license numbers.
Although the hack and attempted payoff have stirred up a media storm, Pittman says, the weightier question is “what was Uber doing with all of this data in the first place?”
“The real story here is about the use of information as currency. Uber takes our data and generates revenue through business relationships built entirely on that data,” he said.
Uber, he noted, has data-sharing business agreements with various companies. Numerous media sources, including Buzzfeed, the New York Times, and The Washington Post, have reported on Uber’s ability to collect, view, and share personal information. Being able to sell this data to ancillary services, such as their partner MoviePass, is part of Uber’s business model – and a key reason why it is able to keep fares well below those of traditional taxis.
This also explains why Uber stores user data in the cloud and did not impose tough internal controls on access.
“Business-to-business integration is easier to achieve with a cloud service model than with an antiquated, self-operated data center model,” Pittman said. “And controlling access to driver and ride information could negatively impact business operations.”

While data-sharing arouses alarm in some quarters – especially when that data gets hacked -- the reality is more complex.
“It’s not in itself a malign phenomenon,” Pittman explains. “Think of the potential good that can come about from information sharing between Uber and Moviepass. Uber knows that a movie’s a hit, so it can make sure sufficient drivers are in the area. Moviepass understands your behavior, so it can inform you of movies you’d like to see and make it easy to get tickets. And then getting a ride there and back is a snap.”
As more and more companies strike deals based on data, tough questions will arise about their responsibility to safeguard that information. The legal and ethical implications remain unclear, Pittman says, because consumers voluntarily cede control of their personal data when they sign up for services like Uber, giving up privacy in exchange for convenience.
“Does Uber have a responsibility to keep this data private?” Pittman asks. “Is it reasonable to expect that our individual claims to privacy extend to a company we've willingly transferred our data to?

“Or, is this simply a sign of the inevitable transition from the Information Age to the Virtual Age? Maybe our concept of information and privacy is what needs to change.”

Trends in Computer Science Programming: It’s All In the Script - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2821

Speed is king in today’s programming environment. And that means powerful, object-oriented programming languages may be losing some of their longtime dominance, says Dr. Eric Sabbah, chair of the computer science program at Capitol Technology University.
bachelor's in computer science student“Scripting is more on the rise – Python, for instance,” Sabbah says. “Object-oriented programming is still a big thing but the momentum is really with scripting now. It’s easier to learn and quicker to write.”

Choosing the right approach depends on the scale and complexity of the task, he notes. For many relatively simple tasks, scripting makes the most sense.  For more complex situations, it’s best to turn to a language like Java or C++.

According to Sabbah, a similar trend towards speed and ease of use is being seen in the database programming arena. Although the longtime standard, SQL, still reigns supreme, simpler alternatives such as JSON are gaining more traction.

“In general, we’re seeing a tendency to sacrifice the super-efficient, well-tested enterprise solutions in favor of a ‘let’s do this quickly’ type of approach,” Sabbah says.  “While the more robust solutions are actually quicker and more efficient once you have them in place, they require more effort upfront.”

“When you’re driven by production deadlines, there’s a tendency to want to go for the solution that can be implemented most swiftly – even if it’s less efficient in the long run.”
The take-home for aspiring computer scientists: opportunities exist for different kinds of programming expertise. Scripting is easiest to learn and may be the quickest way to get a foothold in the industry – but broader expertise is valued too.
Capitol, Sabbah says, reflects the increased diversity of the field in its programs. For those seeking to build a deeper theoretical background, a bachelor’s degree in computer science is still the best fit. But the university also offers programs in software engineering and web development, which equip students with the in-demand coding skills they need in today’s deadline-oriented, fast-paced business environment.
“There are many paths available in computer science,” Sabbah says. “Our programs reflect the variety that characterizes the field today.”

Tuesday, November 28, 2017

Online Shopping: Dos and Don’ts - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2811

Convenient to your door delivery, multiple product reviews at your fingertips, and the promise of grabbing that sale without having to compete in an Olympic-sport-like wrestling match for the last of this season’s hottest item? It’s no wonder more people are choosing to do their holiday shopping online.
But with large data breaches on the rise, like the recent breaches in security with Equifax and Uber, consumers have the right to be concerned about the safety of their information once it hits the internet.
So what are some steps online shoppers can take to help safeguard their data and protect against theft? We asked our Capitol cybersecurity professors for their thoughts:
Dr. William Butler, chair, DSc, cybersecurity program
  • DO: Use a card that has a good dispute resolution process.
American Express, from what I hear, is one of the best – if you dispute something, they’ll reverse it. Some people have a card that they use specifically for online shopping, so that if there’s a dispute on the charge, they don’t have to go through a lot of rigmarole.
  • DON’T: Use websites that want to store your credit card information.
If you have the option, don’t store your credit card information, unless you really like that convenience, because that’s where most of them are getting compromised during the breaches. It’s convenient to store your credit cards on the websites you use the most, but then again that’s where the compromises have happened. With sites like Uber, and others that didn’t report breeches, people’s credit card numbers are out there.
Dr. Jason Pittman, DSc, professor, cybersecurity program
  • DO: shop online without fear.
Retailers do their best to protect purchases and the probability of compromise is low given the amount of companies and sales during this season
  • DON’T: shop online by clicking on links in emails.
Browse directly to the retailers you want to visit to avoid phishing attempts. Yes, your coupon will still apply.
Professor Rick Hansen, cybersecurity program, Cyber Battle Team Coach
  • DO: Always look for the picture of a lock when you’re shopping online.
It signifies a secure site. If you’ve never been to the site before, click on that lock in order to find out more about the site’s security. When you go to the shopping cart, you’ll see that lock. It ensures that you’re on a site that has secure transmissions. If you’ve never been there before, or if it looks sketchy, you can click on the lock and find out more about the connection.
  • DON’T: Click on the links if you receive an e-mail that looks legitimate but is from someone you don’t know.
Most of the time you can hover over the links and see what URLs they actually go to. Say you get an e-mail that looks like it’s telling you about a special offer on Amazon. Don’t necessarily assume it’s really from Amazon – check the identity of the sender. You can do this, on many e-mail clients, with a right mouse click and see what the name is. Sometimes you’ll get sent a link that’s tagged “Amazon.com” but when you investigate the link, you see that it’s actually going to Bob’s Towing.
Keep these Do’s and Don’ts in mind for a safe, secure, online shopping experience this holiday season.

Monday, November 27, 2017

Be on the Alert for Holiday Cybercrime, Urges Professor - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2806

It’s that time of year -- holiday season. That also means cybercrime season. Black hat hackers are on the prowl as we approach the busiest shopping season of the year.
Many companies make as much as one quarter of their annual revenue during the last three months of the year, according to Symantec. Cyber criminals – always on the lookout for opportunities to exploit vulnerable systems and unsuspecting users – often have extra leverage during these critical shopping days.
As hackers continue to perpetrate spectacular data breaches, striking government agencies, corporations, cities, and private citizens with alarming regularity, companies are spending millions to defend themselves and rapidly recover from such attacks. But what can you do to protect yourself from cyber attacks?
According to the chair of Capitol Technology University’s cybersecurity program, Dr. William Butler, there are steps each of us can take in order to avoid becoming a victim.
“Make sure your anti-virus software (AV) software is up to date, use only strong passwords and vary them across websites, make sure you are using your browser in secure mode only, and back up your data regularly and store in a safe place (for example on a cloud drive),” Butler recommends.
But what if you take precautions and are successfully targeted anyway? According to Butler, it’s important to get in touch right away with the proper authorities so that they can investigate.
“If you fall victim to ransomware attacks and other cybercrimes such as identity theft you should immediately contact the Internet Crime Complaint Center (IC3).” Butler says.
The IC3 is co-sponsored by the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C).  For additional information, check out the FBI Page for holiday scams warnings: http://www.fbi.gov/scams-safety/e-scams.
“Remember your personal data or computer should be considered your personal critical infrastructure and should be guarded accordingly,” Butler says. “Shop safe, shop smart, and happy holidays!”

Friday, November 24, 2017

Cyber Analytics degree will position you for a fast-growing field - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2801

When a new career path opens up, it’s nice to get there before the crowd.
 Right now, companies and organizations face a critical need for professionals who can use cyber analytics skills to stop breaches before they occur – thus protecting sensitive data and avoiding the business losses and lowered customer confidence associated with a cybersecurity incident.
They are looking for individuals who not only understand cybersecurity, but are fully at home in the world of data. That means fusing two sets of skills that traditionally have belonged to different domains within education – cyber and business analytics.
“The demand for this combination is unbelievable,” says Dr. Helen G. Barker, vice president for academic affairs at Capitol Technology University. “Because of the lack of degree programs and other avenues for training, companies have had to train their own teams to do this internally. There hasn’t been anything out there that combines cybersecurity and analytics.”
Until now. Starting in Fall 2018, Capitol will be offering a new master’s degree program in cyber analytics, designed specifically to equip students to meet this rising industry need. Like all graduate programs at Capitol, the new master’s degree program in cyber analytics will be offered entirely online.
Protecting company data and assets has traditionally been the job of cybersecurity specialists, who rigorously test networks to locate vulnerabilities and deploy recovery procedures in case a breach happens. With the volume and sophistication of attacks on the rise, however, interest is growing in a new approach – one which uses analytical tools to identify patterns that could be indicative of a coming breach.
Cyber analysts combine cybersecurity skills with the analytics knowledge needed to identify such patterns. This powerful combination offers the hope of stopping cybercriminals and adversaries before they can act.
Students in Capitol’s Cyber Analytics program “will learn to think like the hacker and beat them at their own game” said Professor Soren Ashmall, who is associate director of master’s programs at Capitol and part of the planning team for the new degree.
Capitol will be working with key players in the cyber and analytics industry, including software giant SAS, to shape the curriculum and resources. SAS was on the Capitol campus Friday (November 3) to discuss with students the rising demand for analytical talent in technology and business.
SAS is interested in working with schools like Capitol that are educating a corps of professionals with both technical and analytical expertise. “We have the technology and the tools” said SAS analytics consultant Andre’ de Waal, “So we’d like to make our tools and technology available to universities so that you can be exposed to the tools and analytics, so that when [students] get to the workforce they are ready to succeed without the companies having to go for further training.”
Classes in the cyber analytics program will begin in September 2018, but the program is open for enrollment now. For more information, contact the Graduate Admissions office at Capitol: gradadmit@captechu.edu.

Thursday, November 16, 2017

The future is here: learn about brain-machine interfaces at Capitol workshop - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2591


Imagine being able to operate your computer without needing a mouse or a keyboard, by controlling it directly with your brain.

Imagine using your thoughts to adjust the temperature settings in your home, change channels on your smart TV, play the new Taylor Swift single, or turn on the lights.

Sound like sci-fi fantasy? Once, it would have been. Now it is becoming reality, as a result of brain machine interfaces (BMI) – an emerging field of technological research that is generating intense interest. Capitol Technology University, home to one of the nation’s most highly regarded cybersecurity programs, will be providing an opportunity for young people to learn about brain machine interfaces and even to try them out for themselves.

The university’s popular Cyber Saturday program – aimed at community college students – will focus on BMIs during sessions in February, March, and April. Click here to register or e-mail cybersat@captechu.edu for more information.

“We’re going to introduce brain machine interfaces to students and have them engage in a variety of activities – controlling computers, playing games, and operating various devices,” explained cybersecurity professor Dr. Jason M. Pittman, who is spearheading the initiative together with Dr. Garima Bajwa of the engineering department. “We’ll also be teaching them about the cybersecurity aspects that come with this new technology.”

The program is part of a federal grant Capitol has received to conduct research into brain machine interfaces – and into the host of potential security issues that they raise.

Linking brains to computers can bring about enormous benefits and conveniences, but also opens up new avenues for criminal or malevolent behavior, he said. Malware could potentially be employed that gives adversaries direct access to their victims’ thoughts.

“Imagine the Equifax breach, but in the context of your thoughts,” he said. “Someone’s not breaching a company to steal data that’s on the hard drive. Rather, someone’s seeking to backchannel an EEG device so they can read your thoughts while you are thinking them.

Dr. Bajwa and Dr. Pittman hope to help mitigate these risks through their research, which is focused on authentication -- that is, on ensuring that BMI-controlled devices can only be controlled by the intended user, and that the user’s thoughts are controlling only the intended devices.

“A new paradigm is emerging for how we interact with machines, and along with it comes a new paradigm for criminal action,” Pittman said. “With this capacity-building grant, Capitol is helping to map out this new and largely uncharted territory.”

Interested in exploring BMIs? Contact the cybersecurity program at cybersat@captechu.edu to learn more about the upcoming Cyber Saturday workshops, or register here.


Capitol Technology University Degrees Offered Fall 2017 - Capitol Technology University (Since 1927 Located Near Washington D.C.)

https://create.piktochart.com/output/26110356-capitol-technology-university-degrees-fall-2017

Visit Capitol Technology University: www.CapTechU.edu

Wednesday, November 15, 2017

Analytics Demand Spurs New Programs at Capitol - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link:  https://www.captechu.edu/node/2786

It's a field where employer demand is high and opportunities are burgeoning, industry representatives say. Private businesses and the public sector both have a pressing need for individuals with analytics expertise.

“As everybody knows, there’s a huge shortage of analytical talent out there and some estimates are that millions of students will be needed," said SAS analytical consultant Andre’ de Waal during a visit to Capitol on Friday (November 3).

De Waal and other representatives of SAS, an industry leader in analytics software and services, gave presentations to Capitol students and also met with the faculty to offer input into new analytics programs that are being offered at Capitol starting in Fall 2018.

A master's program in cyber analytics will educate professionals in harnessing the power of data to stop malicious hackers and cybercriminals in their tracks. Also at the graduate level, Capitol is unveiling a technical MBA in business analytics.

Meanwhile, undergraduate students at Capitol can now major in business analytics and become experts in data-driven decision-making, an increasingly pivotal skill set in today's business environment.

Qualified professionals in the field are in short supply and companies ranging from industry giants to emerging startups areo technology pioneers are looking for students with these specializations, De Waal explained. SAS, he said, sees a mutually beneficial relationship in assisting unversities like Capitol with developing analytics programs.
Andre de Waal, analytics consultant, SAS“We have the technology and the tools. So we’d like to make our tools and technology available to universities so that you can be exposed to the tools and analytics, so that when [students] get to the workforce they are ready to succeed without the companies having to go for further training," De Waal said.

Preparing students for the workforce through hands-on training and collaborative learning has long been a cornerstone of Capitol Technology University’s approach to technology education. Capitol was also one of the first institutions of higher education to offer an academic degree program in cybersecurity, making the university a natural fit for the emerging cyber analytics field.

In 2010, it launched the nation's first cybersecurity doctoral program. Capitol’s program is a DHS and NSA-designated Center of Excellence in cybersecurity education.

With the volume and sophistication of cyber attacks on the increase, many see analytics as a way to keep ahead of potential adversaries. “It opens up the possibility of predicting malicious behavior before it happens,” Sarah Alspaw, Director of Career Development and Student Success, said. “As many companies and organizations have learned, pre-empting an attack is far less costly than cleaning up after one."

To learn more about our upcoming programs in business and cyber analytics, contact the admissions department at admissions@captechu.edu or phone 800-950-1992

Cybersecurity Skills and Tools: What You Need for Success in the Field - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2791

With massive breaches of sensitive data in the news daily, the cybersecurity profession has entered the public spotlight as never before. Career opportunities remain plentiful, with demand far outstripping supply. What are the critical skills that an aspiring cyberwarrior needs for success? And what are some of the most common tools used in the field?

“From a beginner’s perspective, learning the Kali Linux operating system is something that can have a great impact,” says Dr. William Butler, chair of the cybersecurity program at Capitol. “This is a variant of Linux that was designed for penetration testing. It comes with a menu of pre-installed tools, such as Nmap and Nessus, which are designed to detect network vulnerabilities. Bachelor’s in cybersecurity students here at Capitol use many of these tools during their introductory courses.”

Students are then introduced to other tools such as Wireshark, which allows them to capture and analyze packets in order to determine what data is in them, and what sorts of commands they might contain, he said.

Cybersecurity students also learn to use forensic tools – the same tools used by police investigators or the FBI to solve cyber crime and criminal cases – in order to examine code hidden on a computer’s hard drive or in memory. Capitol courses and labs include experience with the Encase forensic toolkit, regarded by many as the gold standard in the field, as well as Oxygen forensic software and Cellebrite data extraction and analysis tools.

All these tools help cybersecurity pros retrieve valuable data, but the process doesn’t end there. Data must also be analyzed. Teaching students to do that is a vital component of cybersecurity education.

A solid background in computer programming is an asset for anyone aiming to enter this exciting, high-demand field, Butler said. “You’re dealing with enormous quantities of data. To have the ability to organize that data, analyze it, and draw conclusions, you need a scripting language such as Java or Python. Programming languages such as C are also in high demand.”

Wednesday, November 8, 2017

Launching Your Career In Astronautical Engineering: Tips and Recommendations - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2736

Fascinated by space and satellites? Aspire to a career in the field? The first step, of course, is to gain an education with the right credentials – such as an astronautical engineering degree from Capitol Technology University. But what about the next step? What needs to be done in order to get your career off the launch pad?
We asked Dr. Alex “Sandy” Antunes, associate professor of astronautical engineering at Capitol. He’s mentored dozens of students and seen their careers progress, starting from entry level flight ops positions to higher-level roles in administration. While no one formula works the same way for everyone, Antunes says, most astronautical engineering career paths involve the following steps.
  • Obtain hands-on experience. Understanding theory is good. Being able to apply it is even better. Capitol provides abundant real-time experience to students in the form of projects such as the CACTUS-1 CubeSat mission. That practical experience adds up to greater hireability, Antunes says. “Employers know they won’t have to spend three to six months getting their new employee up to speed.”
  • Build your network. Many, if not most, career opportunities in the field come about as a result of contacts and connections.  At Capitol, astronautical engineering students benefit from the university’s close connections with NASA and private contractors. “We have built a really strong network in this field” Antunes says. “As a result, we have students who are placed in internships that are not announced to the general public. We have people on our advisory board who visit campus regularly to tell us about job openings. Many of our faculty come from NASA-Goddard or from local contractors, and they can help students identify the best avenues for their careers.”
  • Take advantage of internships. “These allow you to ‘try before you buy’ and get a clear idea of what a specific type of job entails on a day to day basis,” notes Antunes. “Without internship experience it can be hard to know exactly what the best fit is for you.” Internships also enable students to make contacts within organizations and build their networks (see “Networking is essential,” above).
As a “fresh-out” (newly graduated student), you’ll most likely be working in flight ops or hardware integration, and your employer will probably be a contractor rather than the federal government, Antunes says. “We highly recommend that graduates go for these entry-level jobs. It gets them in the door, into a team environment, doing hands-on space stuff. Eighty percent of jobs at NASA-Goddard are with contractors; federal employees typically manage and administrate. Starting with a contractor also has the advantage of extending your reach, because they work with multiple entities – not only NASA, but the DoD and other federal agencies.
And what if you go into astronautical engineering only to discover that you’re really not all that crazy about space? “The great thing about the degree is that you’re also an electrical engineer (EE) and a systems engineer,” Antunes says. “So even if satellites aren’t your thing, it’s not that hard to make a switch.  One way or another, there’s a market out there for your skills and knowledge.”
RockSat-X Launch Photo Courtesy of Marissa Jagarnath

Tuesday, November 7, 2017

Industry Leader Visits Capitol as New Analytics Programs Announced - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: http://bit.ly/2Aiw1Kg

The Capitol community recently welcomed SAS representatives to our campus for a special event this past Friday (November 3). SAS, a current industry leader in analytics software and services, came out to discuss the rising demand for analytical talent in technology and business.
Students who attended the event were able to gain a better understanding of the current lack of people resources available to companies regarding analytical needs, what analytical business and cyber analytics programs might involve, and the demand for these skilled workers in both government and industry positions.
Andre de Waal, analytics consultant, SASSAS analytical consultant, Andre’ de Waal had this to say on the current lack of analytical professionals, “As everybody knows, there’s a huge shortage of analytical talent out there and some quotations are like in the millions of students that will be needed in industry employed in analytics.” Many companies, from traditional businesses to technology pioneers are looking for students with these specializations. The IRS came out to speak about the need for analytics professionals in government industries.
De Waal went on to say that SAS sees a mutually beneficial relationship in assisting universities like Capitol with developing programs in analytics. “We have the technology and the tools. So we’d like to make our tools and technology available to universities so that you can be exposed to the tools and analytics, so that when [students] get to the workforce they are ready to succeed without the companies having to go for further training.”
Preparing students for the workforce through hands-on training and collaborative learning has long been a cornerstone of Capitol Technology University’s approach to technology education. Starting in Fall 2018, the university is launching a master’s degree program in cyber analytics and an undergraduate degree program in business analytics.
Starting a cyber analytics program is a natural fit for Capitol in many ways. Given the university’s longstanding engagement with cybersecurity, we are in a unique position to prepare our students to become the pioneers of the field. Capitol was one of the first institutions of higher education to offer an academic degree program in cybersecurity. In 2010, it started the nation’s first doctoral degree program in the field. Capitol’s cybersecurity program is a DHS and NSA-designated Center of Excellence in cybersecurity education.
With the volume and sophistication of cyber attacks on the increase, many see analytics as a way to keep ahead of potential adversaries. “It opens up the possibility of predicting malicious behavior before it happens,” Sarah Alspaw, Director of Career Development and Student Success, said. “As many companies and organizations have learned, pre-empting an attack is far less costly than cleaning up after one.
To learn more about our upcoming programs in business and cyber analytics, contact the admissions department at admissions@captechu.edu or phone 800-950-1992

Monday, November 6, 2017

Online Doctor of Science (DSc) in Cybersecurity at Capitol - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: http://bit.ly/2lWEUqC

What was once an IT concern, cybersecurity is now a boardroom concern. The threat of cybercrime is a disruptive reality for decision-makers across all industries and branches of the government. Capitol Technology University’s first of its kind DSc program in cybersecurity brings together an extraordinary peer community of computer and security experts all committed to understanding and evaluating the scope and impact of systems and technology from institutional, industry and global perspectives.
After completing this program, you’ll be able to conduct research as a foundation for executive action, demonstrate innovation and creativity as it relates to the strategic performance of an agency or organization and contribute to the decision-making process. You can choose electives based on your professional focus.  A few examples of elective topics are; healthcare information security, information assurance strategic management and software assurance development.
Why earn a Doctor of Science (DSc) in Cybersecurity at Capitol?
  • Our doctorate in cyber security degree was the first of its kind in the nation
  • Our low residency requirement takes in consideration the time commitment of your established career
  • Our campus is close to Washington D.C., and many of our faculty work for defense contractors, and government agencies
Active duty/retired military
We’re proud to help the men and women who defend our country advance their education by:
  • Giving members of the Maryland National Guard a 50% tuition discount
  • Offering flexible payment options for active duty students
  • Being a participating member of the Post 9/11 GI Bill Yellow Ribbon Program and Montgomery GI Bill
  • Listing our online programs in the DANTES catalog, which allows students to get tuition reimbursement support under DANTES
  • Getting our programs approved by the Veterans Administration
Key Faculty
Dr. William Butler, Cyber Security Program Director
Bill Butler is currently the program director and head of the Critical Infrastructures and Cyber Protection Center (CICPC) at Capitol Technology University. Previously he worked in the networking and IT industries as a network engineer and consultant and, also served as a joint qualified communications information systems officer in the U.S. Marine Corps. He retired as a Colonel with 30 years of service (active and reserve). Dr. Butler is very active in various working groups such as the National Institute of Standards and Technology Cloud Computing Security Forum Working Group (NIST CCSFWG), Cloud Security Alliance (CSA) Big Data and Mobile Computing Working Group, and the National CyberWatch Center Curriculum Taskforce and the National Cybersecurity Student Association Advisory Board. He holds degrees from Brenau University, Marine Corps University, U.S. Army War College, National Defense University, University of Maryland and Capitol Technology University. Dr. Butler earned his Doctorate in Cybersecurity at Capitol in 2016 researching consumer countermeasures to illegal cellphone intercept.
Dr. Jason Pittman, professor
Jason Pittman draws on his previous experiences as a network engineer, security architect and software developer to make the cybersecurity courses he teaches come alive for his students.
Prior to becoming a professor, Dr. Pittman was the lead in security and development for Silent Circle. His recent scholarly research includes, Trust and Transhumanism: An Analysis of the Boundaries of Zero-Knowledge Proof and Technologically Mediated Authentication, published in Social Epistemology Review and Reply Collective, 2017. And, he’s given numerous presentations at The Colloquium for Information Systems Security Education, the Education Special Interest of the Association of Information Technology Professionals and other professional associations. He holds degrees from Malone University and Capital Technology University. Dr. Pittman earned his DSc in Information Assurance at Capitol in 2012 researching network probing laboratory scenarios.
Career Opportunities
You’ll graduate with the credentials needed to become a senior leader, program developer, and policy maker in federal agencies and the private cybersecurity field.
Online Cyber Security DSc with low residency requirement
  • Online classes allow you to work around your busy schedule
  • Meet on campus two weekends per year
Format
  • Small cohort enables you to network with classmates and receive personalized attention from faculty
  • Accelerated classes, most last 8 weeks
  • Classes taught online, you can refer to the recorded class sessions for review
Requirements/Admissions
  • All applicants must include a non-refundable application fee of $100
  • Applicants need a master’s degree in a relevant field; Cybersecurity, Information Assurance, Computer Science or Information Technology, plus a minimum of 5 years of directly related work experience
  • Click here for specific details regarding online admissions deadlines, where to send transcripts, recommendation forms, etc.
Requirements/Curriculum
  • The Doctorate degree in Cybersecurity is a total of 54-66 credits, which covers a literature review, professional research and theory, professional ethics and leadership, dissertation preparation, and other topics. Students can select from several electives based on their personal focus
  • Click here for a course list
Tuition & Fees
  • The application fee is $100
  • The per credit charge for doctorate courses is $867. This is the same for in-state and out-of-state students
  • The entrance exam fee is $100
 “I liked the fact that there was a lot of writing in the courses. That made it a lot easier when I started work on my dissertation, because I already had a lot of information and research that I could use. The program was very thorough and the staff was helpful.”
--Seria D. Lakes, D. Sc. ’14, Author of Telehealth Security: An Examination of Variance in Telehealth Security Breaches
(Read Seria’s full story here.)

Related Information

Online Ph.D. in Business Analytics and Decision Sciences - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: http://bit.ly/2zoa27q

The Ph.D. in Business Analytics and Decision Sciences program is designed to prepare accomplished professionals for senior positions in either public or private sectors. The mission of the Doctor of Philosophy in Business Analytics and Decision Sciences degree is to enable professionals from the field to understand and evaluate the scope and impact of decision sciences and associated technology from the institutional as well as from an industry and global perspective. The program will provide the student an academic environment to support the development of high-level critical thinking and leadership skills as they relate to management and decision sciences, to develop high-level decision science technical skills, and to provide doctoral level research experience allowing innovative and practical contributions to the management and decision sciences body of knowledge.
Graduates of Capitol Technology University’s Ph.D. program can expect to lead local, national, or global organizations in related fields and provide expert guidance for the understanding of and the utilization of organizational information assets. Graduates can expect to be hired into senior leadership positions in industry, government and academia, and will be able to create and manage unique solutions for any business decision challenge that may arise.
Related Information
Application Instructions
Application deadline for fall cohort is July 1.   All application materials must be received by this date.
Application deadline for spring cohort is November 15. All application materials must be submitted by this date.
Application Fee:
There is a $100 non-refundable application fee to submit this application.  We accept VISA, Master Card, Discover, and American Express. Payment is required to process your application.  The application can not be submitted without the payment.
Essay:
An essay is required to submit the application.  You cannot submit the application unless the essay is complete.  We strongly suggest that you prepare the essay prior to starting the application.  You can then simply paste the essay into the space provided.    The subject of the essay is "Please comment on personal attributes as well as previous experience that are reflective of your ability to successfully complete a doctorate-level program."
Anyone with a master’s degree from a regionally accredited college or university will be considered.
After you complete and submit your application, please submit all requested documents as soon as possible.  These include:  official transcripts, resume, letters of recommendation and certification verification (if applicable). You will receive additional instructions after submitting your application. 

Earn a Technical Master of Business Administration in Cybersecurity (online) (TMBA in Cybersecurity) - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: http://bit.ly/2h8ltWo

Management of cybersecurity is a specific need identified by industry and government communities. According to a 2015 report from Burning Glass Technologies, “The hardest-to-fill cybersecurity jobs call for financial skills, such as accounting or knowledge of regulations associated with the Sarbanes-Oxley Act, alongside traditional networking and IT security skills. Because finance and IT skills are rarely trained for together, there is a skills gap for workers who meet the requirements of the ‘hybrid jobs.’”
The TMBA in Cybersecurity will prepare students to be metrics-driven leaders in the cybersecurity business field.  They will learn to analyze patterns, employ powerful technological tools and drive business decisions in the cybersecurity field.
Why Capitol?
Our location is a magnet for top faculty. The Baltimore/Washington area has one of the largest concentrations of high-tech companies, defense contractors, and government agencies.
Our classes are comprised of like-minded peers. Through collaboration with other students, you’ll learn skills and techniques in class that you can apply on the job immediately.
Capitol Tech special opportunities
All students complete a capstone project. You’ll work with a faculty member to develop a major project-based research paper that draws on prior coursework and your personal experiences.
Career opportunities
Those who earn a technical master of business administration in cybersecurity pursue careers as:
  • Business Cybersecurity Manager
  • Information Security Analyst
  • Business Management/ Cyber Analyst
Active duty/retired military
We’re proud to help the men and women who defend our country advance their education by:
  • Giving all active duty service members enrolled in a master degree program a reduced rate of just $350 per credit
  • Giving members of the Maryland National Guard a 50% tuition discount for up to 12 credits per academic year
  • Offering flexible payment options for active duty students
  • Being a participating member of the Post 9/11 GI Bill Yellow Ribbon Program and Montgomery GI Bill
  • Listing our online programs in the DANTES catalog, which allows students to get tuition reimbursement support under DANTES
  • Getting our programs approved by the Veterans Administration
Program is 100% Online
Our technical master of business administration in business analytics program is offered 100% online. Once you are accepted, all you need is an Internet connection and you can attend class. We keep the classes small so you receive personalized attention from faculty who are interested in sharing their knowledge and helping you succeed. Program begins Fall 2018.
Tuition & Fees
  • The per credit charge for graduate courses is $585, plus fees
  • The active duty military tuition rate is $350 per credit, plus fees
  • There is no charge for online application, $40 fee for paper application

Thursday, November 2, 2017

Earn a Master’s degree in Cyber Analytics Online- Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link:  http://bit.ly/2ypDj2s

Cyber analytics is a specific need identified by industry and government communities.  According to business executives, cyber analytics is a skill set of increasing value to employers.  It is desirable across many fields, across a variety of job categories and levels of employment.  A critical gap between the supply and demand of skilled cyber analytics professionals is already reaching crisis proportions.
Why Capitol?
Our location is a magnet for top faculty. The Baltimore/Washington area has one of the largest concentrations of high-tech companies, defense contractors, and government agencies.
Our classes are comprised of like-minded peers. Through collaboration with other students, you’ll learn skills and techniques in class that you can apply on the job immediately.
Capitol Tech special opportunities
All students complete a capstone project. You’ll work with a faculty member to develop a major project-based research paper that draws on prior coursework and your personal experiences.
Career opportunities
Those who earn a master of science in cyber analytics pursue careers as:
  • Cyber Security Data Analytics Lead
  • Information Security Analyst
  • Chief Security Officer
Active duty/retired military
We’re proud to help the men and women who defend our country advance their education by:
  • Giving all active duty service members enrolled in a master degree program a reduced rate of just $350 per credit
  • Giving members of the Maryland National Guard a 50% tuition discount for up to 12 credits per academic year
  • Offering flexible payment options for active duty students
  • Being a participating member of the Post 9/11 GI Bill Yellow Ribbon Program and Montgomery GI Bill
  • Listing our online programs in the DANTES catalog, which allows students to get tuition reimbursement support under DANTES
  • Getting our programs approved by the Veterans Administration
Key faculty
Dr. William Butler, Cyber Security Program Director
Bill Butler is currently Director, Critical Infrastructures and Cyber Protection Center (CICPC) at Capitol Technology University. Previously he worked in the networking and IT industries as a network engineer and consultant and, also served as a joint qualified communications information systems officer in the U.S. Marine Corps. He retired as a Colonel with 30 years of service (active and reserve). Dr. Butler is very active in various working groups such as the National Institute of Standards and Technology Cloud Computing Security Forum Working Group (NIST CCSFWG), Cloud Security Alliance (CSA) Big Data and Mobile Computing Working Group, and the National CyberWatch Center Curriculum Taskforce and the National Cybersecurity Student Association Advisory Board. He holds degrees from Brenau University, Marine Corps University, U.S. Army War College, National Defense University, University of Maryland and Capitol Technology University. Dr. Butler earned his Doctorate in Cybersecurity at Capitol in 2016 researching consumer countermeasures to illegal cellphone intercept.
Program is 100% Online
Our master’s in cyber analytics program is offered 100% online. Once you are accepted, all you need is an Internet connection and you can attend class. We keep the classes small so you receive personalized attention from faculty who are interested in sharing their knowledge and helping you succeed. Program begins Fall 2018.
Tuition & Fees
  • The per credit charge for graduate courses is $585, plus fees
  • The active duty military tuition rate is $350 per credit, plus fees
  • There is no charge for online application, $40 fee for paper application

Cyber Law: Navigating an Uncertain New World - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2691

The internet has transformed the way we live, work, and interact. In many respects, it has also opened up uncharted legal territory, with experts scrambling to sort out the implications. Businesses want to know who is liable if sensitive data is compromised in a breach. Individuals want to protect themselves from losses and damage incurred by events such as “doxxing” or identity theft. The list goes on.
We asked Dr. Curtis KS Levinson, a leading cyber policy expert, to identify some of the hot-button legal issues impacting the cyber arena. Dr. Levinson is the US Cyber Defense Advisor to NATO and also runs a private consultancy specializing in compliance, continuity/recovery, governance, and security issues.
While cyber law is a vast field, Levinson said, four areas are of particular interest currently: ransomware, identity theft, the Internet of Things, and the legal requirement (in many states) for businesses to have a valid Written Information Security Program on file.
Ransomware: In recent years, more and more individuals and businesses have fallen prey to cyber criminals who infiltrate computer systems, encrypt valuable assets, and threaten to destroy the data or render it permanently inaccessible unless money is paid to them. “I almost always recommend not paying the ransom,” Dr. Levinson says. “Otherwise, you’re just setting yourself up for it to have it happen all over again.” Those hit by such an attack, he notes, not only suffer the consequences of losing their data but must go through the often messy process of assigning valuation to what has been lost. If they have taken out cyber insurance, there may be questions as to what is covered.
Identity Theft: Malicious actors not only appropriate the identities of individual persons but in some cases are able to impersonate entire organizations. In both cases, Levinson says, questions may arise as to who is liable for actions performed in the name of that individual or organization. “It’s not like with credit card fraud, where you’re only liable for a set amount and the credit company picks up the rest,” he warns. “If your identity has been stolen, there may be no clear limitation on what you’re legally liable for, and for how much.”
Internet of Things (IoT): “We’re currently filling our homes and offices with IP-enabled gadgets, from coffeepots to security systems. All these devices and networks are potentially vulnerable to being breached or hacked,” Levinson says. “Your IP-enabled security system may be protecting your home or office, but who is protecting the security system?” If a system is breached and a home or business is attacked, questions arise concerning the legal recourse for victims and the liability that can be assigned to the manufacturer of the system or the vendor that sells it.
Written Information Security Program (WISP): More and more states are now requiring businesses and organizations to have a valid Written Information Security Program (WISP) on file – but many are unaware of the requirement or the steps needed for compliance, Levinson says.
If an incident occurs and a business does not have a valid WISP, any cyber insurance it has purchased may be of no avail. “There’s a lot of fine print involved in cyber insurance, and often that includes a clause stating that you must not only have a WISP in place and have tested it. Your organization can pay cyber insurance premiums every month and then not be able to collect when an attack happens.”
At Capitol Technology University, students earning a masters in cyber security will take IAE-671 Legal Aspects of Computer Security and Information Policy. This course provides an overview of the legal rights and liabilities associated with operation and use of computers and information, including the legal and regulatory compliance issues critical for chief information security officers.