Friday, December 29, 2017

STEM graduate student virtual career fair brings new opportunities to Capitol students - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2931

For master's students, the new year brings a new opportunity at Capitol: a special career event that will enable you to make contacts with employers and build up your network -- all without having to travel to campus!

Capitol Technology University is hosting an online virtual career fair for graduate students in our STEM-focused programs.

This online fair was designed to make it possible for graduate students seeking more connections to potential employers in STEM to be afforded the same opportunities at career advancement as our undergraduates. The event is being held in partnership with the National Association of Colleges and Employers (NACE) STEM coalition, which consists of eight other universities with a focus on STEM programming.
 
“We’re really trying to figure out ways we can, in addition to our regular undergraduate career conference, bring unique and innovative opportunities to our students to make sure that they and our employers get face to face contact,” said Sarah Alspaw, Director of Career Development and Student Success.
“There’s only so much I can do as a middle person to communicate the abilities of a student,” says Alspaw.  “This career fair will be an excellent opportunity for students to build up their professional network.”

Attendees will be given the chance to both interact with potential employers on an individual level and to learn more about the companies looking to hire students with their educational background.

In teaming up with other institutions, Capitol has been able to pool our connections to potential employers together with the connections of the eight other schools coming together for the fair. “Because there are eight other universities, with 15,000 graduate students between us, we can bring bigger name companies that are willing to spend the time. There will be information out to our graduate students very soon, and to our partnering employers who we’re going to invite to the fair,” said Alspaw.

The virtual career fair will be held on Tuesday, January 23, 2018, and it will run from 1:00 p.m. to 4:00 p.m. EST. To register to participate as an employer, please contact careers@captechu.edu by Tuesday, January 16, 2018.

Tuesday, December 26, 2017

Capitol hosts IEEE workshop on software-defined devices - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2921

Once, engineers talked about software-defined radios. Now many are talking about “software-defined everything.”

According to SDxCentral, the new term encompasses “any physical item or function that can be performed as or automated by software.” When you tap the Uber app for your ride home from the movies, you’re making use of “software-defined everything.” Other examples, according to SDXCentral, include GoPros, remote-controlled thermostats or security cameras, drones, and self-driving cars.
The rapid expansion of software-defined products and processes was the focus of an IEEE workshop held at Capitol Technology University on Saturday (December 16) and sponsored by the university’s electrical engineering department. The event featured a keynote address by Dr. Yang Guo of NIST’s Internet and Scalable Systems Metrology Group.

Guo briefed participants on software-defined networking (SDN) and SDN-based programmable measurement. Other presentations at the event focused on the Internet of Things, the FCC regulatory picture, the path from 2G to 5G, and the Army Research Laboratory’s use of software-defined radios.
According to Dr. Nayef Abu-Ageel, academic dean at Capitol and chair of the university’s electrical engineering department, the workshop was intended to highlight emerging developments in the market – developments which, he said, could impact curriculum choices.
“We see a need for network engineers to boost their programming skills because of this trend, Abu-Ageel said. “Software is replacing various hardware functions, so it’s important for network engineers to understand the software and how it works.”
A benefit of the event is that it facilitated discussion and exchange of ideas among subject matter experts and faculty members from multiple universities, including Capitol. That kind of interaction creates a valuable synergy, Abu-Ageel said.

It also benefits students. “Capitol has a long-standing mission to provide an education that reflects emerging developments and industry needs, and we achieve this mission in part through partnerships with organizations like IEEE,” Abu-Ageel said. “As  a small, agile institution, we can respond to developments quickly. Our faculty can come back from an event like this with new ideas that they can implement in their courses.”

Capitol is the only independent university in Maryland with a specialized focus on engineering, computer science, cybersecurity, and business. For more information on Capitol’s engineering program, contact Dr. Abu-Ageel at mailto:nmabuageel@captechu.edu.

Thursday, December 21, 2017

Galaxies of data: Analytics opens new aerospace frontiers - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2936

Astrophysicist Carl Sagan was famous for his use of the word “billions.” As he liked to remind viewers of the TV show Cosmos, a galaxy is composed of billions upon billions of stars.

If he were still around today, Sagan might turn his attention to another large unit of measurement: the gigabyte. Astronomers, astrophysicists, space engineers, and the aviation industry are all increasingly interested in collecting large amounts of data – gigabytes worth of it.

Back in 2012, Nick Skytland, a blogger for the national space agency, wrote, “In the time it took you to read this sentence, NASA gathered approximately 1.73 gigabytes of data from our nearly 100 currently active missions!” Just imagine how much more data they gather now.

“We do this every hour, every day, every year – and the collection rate is growing exponentially. Handling, storing, and managing this data is a massive challenge,” he wrote.
NASA uses that data for a myriad of purposes, ranging from space weather predictions to optimizing payloads during rocket launches.

 “Our data is one of our most valuable assets,” said Skytland, “and its strategic importance in our research and science is huge. We are committed to making our data as accessible as possible, both for the benefit of our work and for the betterment of humankind through the innovation and creativity of the over seven billion other people on this planet who don’t work at NASA.”

Outside of NASA, private space companies such as Orbital and Space-X are also keen to harness the power of data. Gathering and correctly interpreting the data can be crucial to everything from manufacturing processes to deciding on launch dates.

However, data-driven decision making requires more than just the ability to harvest raw numbers. It requires professionals with analytical skills who can draw accurate conclusions from the vast quantities of incoming information.
Capitol students learn data analytics skills for aerospace industry
Equipping professionals with data analytics skills is the mission of Capitol Technology University’s new undergraduate and graduate degree programs in business analytics, unveiled this month with enrollment open now for the Fall 2018 semester.

“Business analytics is the degree right now,” says Dr. Michael Fain, Director of Doctoral Programs for Capitol Technology University. “It is cutting edge. It subscribes to best practices. Whatever formulas business leaders are using to guide their strategic plans – whether those plans be for one year or five years – only when they begin using concepts and paradigms involving data analytics can real, substantive decision-making emerge.”

For aspiring business analysts with a particular interest in the space arena, Capitol offers the advantage of close connections to NASA as well as to private firms such as The Hammers Company, which recently established a new Space Flight Operations Training Center on the Capitol campus.
The university has a longstanding relationship with NASA, partnering with them on projects like our recent Cactus-1 satellite mission as part of NASA’s CubeSat Launch Initiative. And our location, right in between Baltimore and Washington D.C., is nearby the NASA Goddard Space Flight Center.

“Capitol has an ongoing commitment to partnering with federal agencies and the private sector in order to keep abreast of specific needs in the field,” said the university’s chief academic officer, Dr. Helen Barker. “We use that to shape the curricula in our programs, including business analytics.”
Capitol is offering three degrees in business analytics: a bachelor of science in business analytics at the undergraduate level, an MBA in business analytics, and a doctorate level PhD. The doctoral degree is offered online, making it a perfect fit for aerospace engineers and other professionals seeking to boost their analytics skills.

To learn more about NASA’s need for data engineers click here to read Skytland’s article. 

Wednesday, December 20, 2017

At technology-focused Capitol, Cyber Battle Team is the sports star - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link:  https://www.captechu.edu/node/2916

The events are intense. They’re fun. And they help cyber security bachelor’s degree students put the concepts they’ve learned into practice, testing their skills against competitors in a real-time environment.
Cyber Battle Team at Cybersecurity Competition
Cybersecurity competitions, like the Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC), have become an integral part of education in the field. With a national discussion in progress on how to meet the critical shortage of cyber security professionals, many see such competitions as essential to building the needed skills.

Studying cybersecurity at Capitol, you’ll have the opportunity to participate in the MACCDC as well as other contests, such as the National Cyber League competition season, MITRE Cyber Academy’s Capture the Flag (CTF) event, and the Maryland Cyber Challenge. As a university with a specialized focus on engineering and technology, Capitol’s Cyber Battle Team is in the limelight, much as athletic programs are at many other schools.

“This is our sports team,” says Dr. William Butler, head of the cybersecurity program at Capitol. “Every year, they make us proud.”
Experience in cyber competitions builds skills that go beyond what can be taught in a classroom, says Professor Rick Hansen, the team coach. In a competitive environment, students learn to think quickly and make precise, on-the-spot decisions.

“At our heart, we’re all competitive beings,” Hansen says. “From an early age, it’s how we learn – we play and we compete with each other.  It teaches you lessons you can’t learn in any other way.”

Cybersecurity students practice for competitionAspiring cyber warriors at Capitol not only have the benefit of attending a highly ranked cybersecurity program – designated a Center of Excellence by the Department of Homeland Security and the National Security Agency -- but they also have access to the school’s Cyber Lab, a unique training resource.

“The Cyber Lab has equipment, training software, and staff who are there to help,” Hansen says. “Students can set up their own cyber playground at the lab and practice the challenges and exercises that they’re most interested in.”

The Cyber Battle Team lineup changes each year as students progress through the program, with seasoned competitors serving as mentors to their younger counterparts. In this way, new students quickly master the learning curve and a cohesive team is built in time for the competition season, which typically gets under way in January.

“When it all comes together, it’s magic,” Hansen says.

Want to be part of the action? Click here to request information about Capitol’s cybersecurity programs or send an email to cybersat@captechu.edu to learn about upcoming events.

Friday, December 15, 2017

Cyber’s increased role in warfare heightens need for expertise - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2906

Want to serve your country and protect against dangerous adversaries? Increasingly, acquiring cybersecurity expertise is of pivotal importance.

A soldier holds his smiling childThe US Army drove that point home on Wednesday (December 13) when it announced plans to deploy teams of cyber warriors in order to intercept enemy intelligence or thwart planned attacks.

Today’s warfighter has to think out of the box and ask questions such as “how can I influence by non-kinetic means? How can I reach up and create confusion and gain control?” Colonel William Hartman of the U.S Cyber Command in comments to reporters Wednesday.

The U.S. military has used cyberwarfare to hinder ISIS networks, including by altering messages sent by ISIS commanders with the result that militants are sent into the path of drone or plane strikes, according to New York Times article quoted by the AFP. Denial of service attacks are also used against adversaries, AFP said.

The Coast Guard, meanwhile, has placed cybersecurity capability on the same level of importance as procuring new vessels or aircraft. “We’re going to operate in cyberspace just like we have in the maritime domain for over 227 years,” American Security Today quoted the Guard’s cyber commander, Rear Adm. Kevin Lunday, as saying.

At Capitol Technology University, home of the nation’s first doctoral program in cybersecurity, students are carrying out innovative research into the military implications of computer networks and the possible use of cyber tools on the battlefield.

In 2013, Capitol doctoral student Dr. Warren D. Lerner conducted a study on using artificial neural networks to determine the location of improvised explosive devices (IEDs). More recently, a 2016 dissertation by Kui Zeng focused on cybersecurity requirements in the defense acquisition process.

“The strategic and military implications of cybersecurity are a central concern at Capitol,” Dr. Helen G. Barker, chief academic officer, said. “Many of our faculty, including program chair Dr. William Butler, come to us with a military background, and we get quite a few doctoral students who come here specifically to address research problems related to defense or national security challenges.”

In addition to doctoral research, Capitol is helping to meet the need for cybersecurity expertise through programs at the undergraduate and master’s level. The university actively seeks to make these programs available and affordable to military personnel through a tuition discount program.
Under the program, tuition is $250 per credit for all active duty service members pursuing undergraduate degree programs, and $350 for all active duty service members pursuing master’s degree programs.

“Meeting the career and educational needs of our country’s servicemen and servicewomen has long been part of our mandate as an institution,” said Capitol’s senior vice president for enrollment and marketing, Dianne O’Neill. “Military personnel who have received cybersecurity training as part of their service may well find that Capitol is an ideal opportunity to build on that training as they transition into civilian life.”

For more information on cybersecurity programs at Capitol, contact program chair Dr. William Butler at wmbutler@captechu.edu.

Thursday, December 14, 2017

Learning the language of cybersecurity - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2901

As in any technical discipline, cybersecurity students learn to master the tools and resources needed for the work they do.

They also become familiar with the terminology used by cybersecurity professionals in the field. Are you interested in studying to become a “white hat hacker” and use your skills to conduct authorized exploits against networks and systems? As a cybersecurity student you’ll find out how. And you’ll also become conversant with the terms below.

Confidentiality, Integrity, and Availability. The “CIA Triad,” not to be confused with the Central Intelligence Agency, constitutes the benchmarks that all cybersecurity initiatives measure themselves by. Confidentiality means that only authorized users have access to information. Integrity means that information is accurate and complete. Availability means that authorizers have, in fact, the ability to access the information.

McCumber Cube. Organizations are complex, as are their information needs and security goals. A cybersecurity framework developed by John McCumber in 1991 uses a Rubik’s Cube as a way of conceptualizing this complexity and identifying the many factors involved. The cube brings together desired goals (confidentiality, integrity, and availability), information states (storage, transmission, and processing), and safeguards (policies and practices, human factors, and technology).

Defense in Depth. Also dubbed the “Castle Approach,” defense-in-depth refers to the strategy of creating security controls at multiple levels throughout an IT system. In doing so, should any one security control fail, others will continue to provide protection.

Penetration testing. To identify possible weaknesses, organizations sometimes authorize cybersecurity professionals to launch attacks on computer systems with the goal of uncovering security holes. This kind of authorized intrusion is sometimes colloquially known as “white hat hacking.”

Zero Day Attack. Sometimes cyber adversaries will find out about a software flaw before the maker or vendor of that software becomes aware of the problem. They will then hurry to take advantage of the vulnerability before it is discovered and fixed. Such scenarios – which can include planting malware or accessing sensitive data -- are known as a “zero day attack.”

Tuesday, December 12, 2017

Business Analytics: Position yourself for the growth industry with a degree from Capitol - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2891

In a competitive world, success depends on finding and maintaining an edge – and that requires making data-driven decisions.

The reward for sound decision-making is improved market share. The punishment for unwise decisions, in today’s economy, can be ruthless. That’s why organizations in an ever-expanding array of industries – from sports to health care to cybersecurity – are seeking out professionals with the expertise needed to utilize data effectively.

With a degree in business analytics from Capitol, you could be one of those highly sought-after professionals. Capitol offers business analytics with a difference – the data difference.

“As a student in business analytics here at Capitol, you would learn how analytics helps shape strategic plans at organizations or universities, whatever business you are involved in.” says Dr. Michael Fain, the university’s director of doctoral programs. “Numbers and data should drive the decisions that administrators make for their mission, vision, and value of their respective organizations. As a student here we teach you how to take data, or numbers, and plug these numbers in to help leadership come up with a strategic plan.”

Capitol Technology University offers multiple degrees in business analytics – a bachelor of science, a technical MBA, and a PhD in Business Analytics and Decision Sciences. The master’s and doctoral programs are offered online, bringing these opportunities within reach of working professionals and career changers.

The time to seize these opportunities is now. In a December 2016 report, the McKinsey Global Institute (MGI) cited a “continuing shortage of analytics talent,” with data scientists in particularly high demand. MGI found that average wages for data scientists rose by about 16% between 2012 and 2014, at a time when overall wages were increasingly by only 2%
The US Bureau of Labor Statistics predicts faster-than-average, 12% growth for management analysts between 2016 and 2026. For data scientists, the demand is astonishingly robust, with job postings increasing by 361% between 2013 and 2016, according to EAB. Data analysts, meanwhile, saw an 83% growth in opportunities during the same period.
But where are the professionals with the skills to help companies do that? According to McKinsey, there’s an acute shortage. The US economy alone – not to mention the rest of the globe – needs approximately 140,000 to 190,000 professionals with deep analytical skills, and as many as 1.5 million managers and analysts with the knowhow needed to transform data into effective decision-making.

Capitol’s business analytics programs prepare you to take advantage of these trends because of their strong data focus. With such expertise under your belt, you’ll have a panoply of industries and careers to choose from. You could be the sports analyst who helps a struggling team regain glory, as happened with the Pittsburgh Pirates in 2013. You could be the savvy political consultant who leads a client to a come-from-behind win. You could locate the competitive edge for a manufacturer or retailer. You could help companies protect vital assets by analyzing threats. You could ensure that health care practitioners are better able to meet the needs of patients.

The list is potentially endless. In today’s economy, every type of business needs data engineers.
“Whether you are working for the federal government, whether you’re working for a local government, whether you’re working for the private or public sector, a degree in business analytics will serve to enhance you professionally for many years to come,” Fain says.

Why study Business Analytics at Capitol? For starters, Capitol’s faculty are working professionals in the field – subject matter experts who apply their knowledge on a daily basis and are up to speed on emerging developments. “These are individuals who are actually doing the work that they are training students to invest in,” Fain said.

Capitol has a longstanding focus on practical, hands-on education and an unparalleled focus on students. “I think that our program is unique in that we are very student focused. Even in the virtual world, we have an open door policy and we are available for our students, Fain said.
Want to learn more? Contact the admissions department at admissions@captechu.edu or sign up for an undergraduate open house or a graduate information session. With a business analytics degree, the sky’s the limit. And Capitol will get you there.

Eyeing a security clearance? It helps to be prepared - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2886

It’s the passport into a world of opportunities within government, defense, and other sectors: a security clearance. For students in some fields, such as cybersecurity, being able to obtain one is an absolute must.

Sarah Alspaw, Associate Director Career Services“It represents, for the federal government, a way of determining that you can be trusted,” notes Sarah Alspaw, associate director of career services at Capitol Technology University. Getting a clearance is a high priority for many students at Capitol given the school’s focus on engineering and technology fields and its close links to federal employers.

“We work with a lot of employers that require security clearances,” Alspaw said.

Whether aiming for a confidential, secret, top secret, or Sensitive Compartmented Information (SCI) clearance, students need to think ahead to the clearance process, understand the requirements, and be aware of potential red flags, she said.

1. Find a sponsor. Job-seekers going into the federal employment marketplace often face a Catch-22: you need a clearance to land certain jobs, but a clearance can’t be obtained unless a company or organization is willing to sponsor the process. “You can’t just run out and obtain a clearance on your own,” Alspaw notes.

Traditionally, employers would provide “contingent” job offers, in which a candidate is first hired and then goes through the clearance process under company sponsorship. Nowadays, though, many companies are looking for applicants who have already been cleared through some prior position, stated Alspaw.

Cybersecurity bachelor’s students can position themselves ahead of graduation by doing internships that lead to a clearance, she said. Capitol works with programs such as the National Security Scholars Program (NSSP), which includes a security clearance as part of its scholarship package, and also connects students with internships that can get them on track.

2. Ditch the illegal downloads. Does the federal government really care that you watch pirated movies or grab your favorite music from file-sharing networks? The answer is yes, Alspaw says – those FBI warnings at the start of a DVD are for real, and involvement in piracy will count as a serious strike against you when applying for the clearance. “That includes not only illegally downloading music and movies, but also textbooks,” comments Alspaw. “Textbooks are a big deal among university students, obviously, but if you’re getting materials that you should have paid for, for free, you’re breaking the law.”

Clearance seekers are hooked up to polygraphs and asked a range of questions that cover topics including online behavior, and they must also disclose such information on the SF-86 application form.

3. Get Your Finances in Order. In vetting clearances, the Secret Service is particularly alert to issues that could expose an applicant to blackmail or induce acts of espionage. Financial woes are high on the red flag list. “Having student loans or credit cards isn’t a problem,” Alspaw says. “But having outstanding credit card or loan debt is.” To help students avoid such pitfalls, Capitol provides training in financial literacy as part of the Freshman Seminar that all undergraduates must take.

4. Steer Clear of Drugs. Investigators will conduct a thorough check to ensure you are not using illicit substances. “Don’t take anything that hasn’t been prescribed to you,” Alspaw says. “If you’re found to have used drugs of any kind illegally within 365 days prior to your application, that’s an automatic disqualification.”   Investigators will also contact family members, friends, and roommates who may disclose instances of substance abuse.

5. Don’t Broadcast Your Status. The fact that you’ve applied for or received a clearance should be kept private. Publicizing such status, in addition to breaching the rules, can lead to being targeted for social engineering efforts by adversaries. “Keep in mind that in the security field, you may be discouraged not only from revealing your clearance, but also from talking about your job. Some of our former students aren’t even allowed to tell people where they work,” Alspaw says.

Top-secret and SCI levels of clearance are often required for the career paths of greatest interest to Capitol students. “Due to the subject matter we teach here, many of our students are looking at careers with the NSA or with companies serving the nation’s intelligence and defense needs” said Alspaw. These fields of study can lead to widely impactful careers. Being prepared to apply for a security clearance brings our students one step closer to making a difference.

Friday, December 8, 2017

Capitol’s new chief academic officer, Dr. Helen G. Barker: “We’re at an exciting juncture for the university” - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2881

Since coming to Capitol in 2000, Dr. Helen G. Barker has served the university in many capacities: first as an adjunct professor, then as a member of the full-time faculty, and subsequently as academic dean.
She has helped countless students at the graduate and undergraduate levels, mentored faculty, and spearheaded new programs.  Now, as Capitol enters an era of new presidential leadership and expansion, Dr. Barker brings her experience and vision to a pivotal role at the university: that of chief academic officer (CAO).
Dr. Barker became CAO in the fall of 2017 and will chart a course forward as Capitol launches multiple new programs, including a PhD in technology, a master’s program in cyber analytics, as well as undergraduate and graduate programs in business analytics.
In the following interview, Dr. Barker highlights her priorities as CAO and also discusses some of the characteristics that distinguish Capitol from other colleges and universities.
What are your primary goals as CAO? What do you most want to accomplish?
I aim to foster a culture of growth at the university – a culture that thinks not only about where we are now, but where we can be, and what we can conceivably do. How can we make what we do even better and more exciting?
It’s not a top-down agenda; it’s an everybody agenda. We’re looking for creativity and innovation to spread throughout the institution. We’re a team in this journey that will shape what Capitol becomes in the future.
What perspectives do you bring with you as someone who has been a faculty member?
I bring the perspective of someone who understands faculty concerns, and also the perspective of someone who has worked closely with students for many years. I have an up-close understanding of the teaching and learning environment that our faculty delivers to students.
As CAO, my role involves finding the right balance between different sets of concerns. There are many great ideas out there for programs, classes, or resources, but not all these ideas align with the Capitol mission. And not all of them are viable from a budgetary standpoint. As an administrator, it’s part of my job not only to make these calls, but to convey to other stakeholders in the university the reasons for making them – the parameters we are working within. Because I’ve been a faculty member and a dean, I feel I’m in a good position to foster a productive dialogue among students, faculty, and administration.
While a faculty member, what are some essential things that you learned about how to deliver educational value to students?
Number one is to understand that you can and should learn from the students. The classroom is a two-way experience. No matter how bright we think we are as faculty, no matter how much we know, there’s always something to learn. That can mean, for instance, learning new ways of teaching that are effective with a younger generation of students – the millennials. It can mean learning how to better serve students who have a disability.  My experience is that students have greater respect for teachers who understand that education is a two-way process.
I also think it’s essential to stick your neck out on behalf of your students – experiment, modify your game plan as needed, and resist the temptation to stay in your comfort zone.  That could mean, for instance, collaborating with faculty in other disciplines to create a hybrid course, like Dr. Sandy Antunes of the astronautical engineering department has done together with cybersecurity professor Rick Hansen. It can mean taking on a mentoring role for students, as Dr. Garima Bajwa did when she assisted one of our students, Zalika Dixon, in developing a project that eventually went to the Grace Hopper Celebration and won a research award.
Our new president, Dr. Sims, has shown a commitment to encouraging out-of-the-box thinking – and that’s an opportunity we should all be excited about. We all have an opportunity to take Capitol to the next version of who we are.
Higher education is often said to be going through a period of considerable flux, as schools re-evaluate what their mission is and how best to meet the needs of a rapidly changing economy. What do you see as the major challenges?
It’s crucial to stay on top of what the market is looking for, while continuing to adhere to the highest educational standards and the requirements for accreditation.  Students need the fundamentals as well as specialized academic skills. It can sometimes be a delicate balance. A given program has a prescribed number of credits. Students pay tuition for all of these credits. We don’t want students racking up massive debts paying for courses that aren’t relevant to their educational and career tracks. At the same time, we don’t want students graduating without a solid, well-rounded education that includes critical thinking and the liberal arts.
For a small, independent university like Capitol, budgets are always a challenge.  At the same time, tight budgets can fuel creative thinking and wise decision-making. Capitol has thrived over the years because we’ve made good choices. Small size is also an asset in that it makes us more agile; we can respond more quickly.
What are some things about Capitol that inspire you, that make you feel excited to be here?
This is a close-knit, caring community. Not long ago, a member of our adjunct faculty became ill while teaching requiring emergency care. She told us later that she realized that day how genuinely concerned we all are here about each other’s well-being. It’s the Capitol culture. We’ve created an environment of caring, dedicated, hard-working people who think in terms of what’s good for the school, for the students, and for each other as members of the university community. I appreciate working in this type of environment.

Thursday, December 7, 2017

Capitol Astronautical Engineering Students Put Finishing Touches on Cactus-1 CubeSat - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2876

It’s the moment every astronautical engineer involved in satellite missions looks forward to: the launch date.
That’s when the weeks of effort – the team meetings and problem-solving sessions, the copious time spent in the lab, the seemingly endless adjustments and rebuilds -- reach their culmination. The planning and preparation transform into measurable results. For the Capitol Technology University astronautical engineering student team involved in the university’s Cactus-1 satellite mission, that moment is fast approaching. NASA is expected to confirm a date for lift-off within the coming months.
“Cactus-1 is launching in the spring or summer of next year and we’re in our final integration steps,” says Dr. Alex “Sandy” Antunes, the astronautical engineering professor who has mentored the student-led project team. “We’re soldering up the flight boards. Instead of green and black practice boards, you’re going to be seeing the white ones that are used for flight. Because they reflect sunlight, they have better thermal properties.”
Although the Cactus-1 payloads – a debris-capturing tool that uses an aerogel substrate, and a communications experiment – have generated the most attention, there are other, less glamorous aspects to the project that require just as much effort, Antunes pointed out.
“There’s also the bus,” he said. “That’s the power and coms and the computer that controls everything and makes it all work. It’s the least sexy and probably most difficult part of the system because if any part of the bus fails, everything dies” Especially since CACTUS-1 involves multiple student teams that depend on each other for overall mission success.
Lead engineer Pierce Smith, a senior, can be found most afternoons in the clean room of Capitol’s Space Operations Institute (SOI), busily soldering or checking specifications. “We’ve finished most of the design work and have reached the point where we’re saying ‘okay, it’s going to work – we’re ready to build!’”
CACTUS-1 is one of fourteen CubeSats selected for the CubeSat Launch Initiative, representing universities, non-profit organizations, and NASA field centers. Other schools chosen for CSLI include Arizona State, Cornell, Colorado State, Michigan State and the University of Central Florida.
It brings together two student projects – the TRAPSat debris-capturing experiment and Project Hermes, which is exploring methods of satellite command and control via TCP-IP. The teams have morphed over the years as members graduate and new members join.
With the mission now in its final stretch, Smith says it will be deeply rewarding for students to see their endeavors come to fruition.
“I’ve designed a lot of the boards and the mechanical parts and all of those parts are here now. It’s pretty cool to …see them actually made, to see that they will be flying. I think that’s the coolest thing for me,” he said.

Wednesday, December 6, 2017

Ojo: Data Analytics Can Improve Disaster Relief - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2871

When Typhoon Haiyan struck Southeast Asia in 2013, an estimated 6,300 people died in the Philippines alone, and millions were displaced. Williams Ojo, a doctoral student in Capitol Technology University’s PhD program in business analytics and decision sciences, believes those numbers would have been smaller if relief efforts had not been hampered by problems with communication and information management.
“There was a gap in terms of trying to identify precisely the number of people affected and the number of nurses and doctors that needed to be deployed in specific areas,” recalls Ojo, who served as an World Health Organization (WHO) information systems management officer in the wake of the disaster. “I observed that some locations had more doctors and nurses than needed, while others did not have enough. This was because of the lack of an integrated database.”
Lessons learned from the Haiyan relief efforts were the subject of Ojo’s presentation to the Decision Sciences Institute (DSI) conference in Washington, DC, held in November. Data analytics and modelling provide tools that can enable resources to be allocated more precisely, Ojo said in his conference paper, Information Management During Disaster Response in Visayas Region of the Philippines: Typhoon Haiyan Experience.

Steps proposed by Ojo include the development of a simulation model that harnesses data from multiple sources, including satellite imagery and census information, to predict the human resources and medical supplies required for a given community.
Children, pregnant women, the disabled, and the elderly all have different sets of needs, and data-driven modelling could allow relief agencies to calibrate their assistance more precisely, he said.
“If we have baseline data regarding the population, number of health facilities, and human resources in a given area, then we can use modelling to determine the appropriate number of doctors, nurses, sanitation workers, and other personnel that need to be sent to that area during an emergency,” Ojo said.
As a presenter at the annual Decision Sciences (DSI) Institute conference, Ojo had the opportunity to share his work and exchange ideas with a global community of decision scientists, all attending one of the key professional events in the field. The DSI holds its annual conference each fall at different locations around the world.
Ojo, who began his doctoral studies at Capitol in the spring of 2017, plans further research into the use of analytics and modelling tools as he completes his PhD dissertation in business and analytics, one of three online doctorates available at the university.
Capitol’s doctoral program in cybersecurity, launched in 2010, was the first of its kind and has received successive Center of Excellence designations from the DHS and NSA. In 2014, the university established its PhD program in business analytics and decision sciences, and in 2017 Capitol unveiled a new PhD in technology.  For more information about Capitol’s programs, contact gradmit@captechu.edu

Friday, December 1, 2017

Professor: Rise of Mobile Is Changing The Cybersecurity Field - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2841

Do you remember a time when you used your mobile phone simply to make phone calls?

For most, those days now seem like the distant past. Smartphones have now become integrated into nearly every aspect of our lives. We use them to monitor our health. We use them to track our exercise routines. We use them to help us get where we’re going, and to keep abreast of the information we need.

And we use them to make financial transactions and shop.

Along with our increased dependence on mobile devices comes increased interest among cybercriminals and hackers. For cybersecurity professionals, this means a proliferation of new attack surfaces – and a major challenge when it comes to securing them.

“We’re at a game-changing moment in the field,” the chair of Capitol’s cybersecurity program, Dr. William Butler, says. “Suddenly everyone is carrying around these powerful, miniature computers, all connected to the internet, and all containing sensitive information that you do not want the wrong people to gain access to.”

“The potential risks are mind-boggling. And we have to figure out how to protect against them.”

The two major mobile platforms – Apple and Android – reflect starkly different philosophies, each with its pros and cons. Android’s operating system, developed by Google, is mainly open-source – an asset to app developers that comes with a potential cost in terms of security. Vulnerabilities are addressed through patches, which must then be applied by the individual vendor that sells you your phone. According to Slate magazine tech writer Dan Gilmour, Android is a “freewheeling mess.”

Apple, by contrast, controls its operating system tightly and automatically sending updates to iPhones. But the closed nature of the Apple environment, critics argue, hampers its flexibility.

Besides the question of how to secure current devices, there is also the problem of older devices that are still in use – but lagging far behind in terms of security.

“A major issue is protecting millions of legacy devices currently in use, which do not have the capability to implement the latest countermeasures (multi-factor authentication, encryption, VPN to name a few),” Butler notes. “The threat to these Internet-connected devices is very real and continues to evolve quickly as public reliance on these devices increases.”

At Capitol, Butler and other cybersecurity faculty are helping educate students to meet the challenges posed by mobile. The Capitol cybersecurity program, a DHS and NSA-designated Center for Excellence in cybersecurity education, draws its faculty from professionals working in the field and updates its curriculum regularly to reflect emerging developments, including the rising prevalence of mobile.

“The challenges are many,” Butler says, “but the rewards presented by these emerging technologies are two important to forgo their use.”

For more information on cybersecurity programs at Capitol, contact Dr. Butler at 240-965-2458 or whbutler@captechu.edu

Thursday, November 30, 2017

Cybersecurity and the Internet of Things: Tales from the Frontier - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2836

It’s a scenario that many people would prefer not to imagine: you’re speeding down the highway at 70 mph, and an unknown adversary takes control of your car, disconnecting your brakes and eventually crashing you into a ditch.
Two members of the Capitol Technology University Cyber Battle Team participate in a contest.
That’s exactly what happened to Andy Greenberg, a writer for Wired magazine, in 2015. True, the incident did not exactly catch him by surprise: he had volunteered to be a “digital crash test dummy” in an experiment staged by two cybersecurity advocates, Charlie Miller and Chris Valasek. Together, they were out to demonstrate the serious security vulnerabilities associated with internet-enabled entertainment systems, a feature of many vehicles now coming off the assembly line.

With Greenberg behind the wheel of a Jeep Cherokee, the two hackers began to wreak havoc: blasting the interior with frigid air, blurring the windshield with wiper fluid, then disconnecting the transmission and, eventually, the brakes. Even though he was in on the stunt, the writer found it increasingly difficult not to panic – especially as an 18-wheeler bore down on his crippled vehicle.

Greenberg survived to tell the tale, warning that the rush to add internet-enabled features and services is outpacing our ability to secure them from intruders. “Chrysler, like practically all carmakers, is doing its best to turn the modern automobile into a smartphone,” he wrote for Wired.

Hackable cars are only one of the emerging security nightmares arising from the proliferation of internet-enabled devices, or the Internet of Things (IoT), as the phenomenon is commonly dubbed. Across a wide spectrum of industries, companies are eager to harness the capabilities – and, in many cases, the potential cost savings – that come with an IP address.

The result, too often, is a wide-open back door for cyber criminals and a raft of unsuspected consequences for businesses and consumers.
Cyber Battle Team members watch a monitor.An internet-enabled HVAC system, for example, was the initial point of entry when hackers compromised the Target Corporation’s internal network in December 2013, staging one of the most infamous data breaches to date. The thieves appropriated domain access privileges and disguised themselves as admins, then tunneled their way into database servers, gaining access to the Personally Identifiable Information (PII) of 70 million customers and stealing 40 million debit and credit card credentials – which they then sold on the black market.

And it all started because of a convenient, cost-saving new feature added to many HVAC systems: network access. Such access enabled the vendor in charge of heating and air conditioning services to remotely monitor energy consumption and temperatures at individual stores.

An expanding attack surface

Staying ahead of the security problems posed by the dizzying array of networked devices is a key priority at Capitol Technology University, long known for its cutting-edge undergraduate, graduate and certificate programs in cybersecurity. The university was among the first to offer a doctorate in the field, starting in 2010.

Today, Capitol continues to upgrade its curriculum and provide new resources in response to quickly evolving trends. The pool of students seeking cybersecurity expertise is changing as well. No longer merely a concern for specialists, cybersecurity is becoming everyone’s business.

William Maconachy, vice president of research at Capitol Technology University and a revered pioneer in the field, believes the general public can no longer afford to remain blissfully ignorant.
Dr. William Vic Maconachy
“Tremendous vulnerabilities are there as a result of our becoming so web-reliant. Web reliant equals web vulnerable,” he said.

While the potential to wreak financial havoc is serious, Maconachy says it’s the implications for personal privacy that keep him up at night.

He cites, as an example, the experience of a friend who installed a home security video system, only to discover that it was being hacked. Instead of providing security to him and his family, the cameras were being used by an outsider to spy on their activities.

“The invasion of privacy is becoming a big thing,” Maconachy says. “It’s not just about thieves stealing money off of your credit card, bad as that is. We’re talking about serious intrusions into a person’s life space.”

Dr. Jason M. Pittman, a professor of cybersecurity at Capitol, sees a cybersecurity arena that is becoming increasingly complex and decentralized.

“The single most pressing area over the next five years will be low-power, embedded devices. These devices will accelerate in their penetration into daily life because of the huge benefit to society,” he said.

Pittman and his colleagues are working to bring about a fundamental change in attitude among stakeholders in cybersecurity technology, including application developers, businesses that offer services, and the consumers that use them.

“We need to massively rethink our approach to developing technology. Improving quality of life and reducing inane burden is the purpose of technology. But we need to begin producing technology that innately includes cybersecurity features,” Pittman said.

 “Secondly, we need to develop a collective ability to move faster when vulnerabilities are announced. Adversaries will always have n+1 steps while we only have n steps. We need to leverage that,” he said.

“We need to evolve a view in which cybersecurity is a baseline attribute.”

Capitol offers cybersecurity degrees at the undergraduate, master's, and doctoral levels. Click here to request information about graduate level programs. For our undergraduate programs, click here.

Wednesday, November 29, 2017

When Personal Data is No Longer Yours: Lessons From the Uber Breach - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2816

It’s a familiar tale by now: a high-profile organization comes forward, well after the fact, to acknowledge that it suffered a cybersecurity breach that affects multitudes of consumers.
But in the latest case – involving rideshare giant Uber – the breach itself may not be the most significant part of the story, argues cybersecurity expert Dr. Jason M. Pittman, who teaches at Capitol Technology University.
On Tuesday (November 21) Uber disclosed that it paid $100,000 to hackers who accessed 57 million users’ personal data in 2016. Uber says the hackers promised to destroy the stolen data, which included names, e-mail addresses, phone numbers, and in some cases license numbers.
Although the hack and attempted payoff have stirred up a media storm, Pittman says, the weightier question is “what was Uber doing with all of this data in the first place?”
“The real story here is about the use of information as currency. Uber takes our data and generates revenue through business relationships built entirely on that data,” he said.
Uber, he noted, has data-sharing business agreements with various companies. Numerous media sources, including Buzzfeed, the New York Times, and The Washington Post, have reported on Uber’s ability to collect, view, and share personal information. Being able to sell this data to ancillary services, such as their partner MoviePass, is part of Uber’s business model – and a key reason why it is able to keep fares well below those of traditional taxis.
This also explains why Uber stores user data in the cloud and did not impose tough internal controls on access.
“Business-to-business integration is easier to achieve with a cloud service model than with an antiquated, self-operated data center model,” Pittman said. “And controlling access to driver and ride information could negatively impact business operations.”

While data-sharing arouses alarm in some quarters – especially when that data gets hacked -- the reality is more complex.
“It’s not in itself a malign phenomenon,” Pittman explains. “Think of the potential good that can come about from information sharing between Uber and Moviepass. Uber knows that a movie’s a hit, so it can make sure sufficient drivers are in the area. Moviepass understands your behavior, so it can inform you of movies you’d like to see and make it easy to get tickets. And then getting a ride there and back is a snap.”
As more and more companies strike deals based on data, tough questions will arise about their responsibility to safeguard that information. The legal and ethical implications remain unclear, Pittman says, because consumers voluntarily cede control of their personal data when they sign up for services like Uber, giving up privacy in exchange for convenience.
“Does Uber have a responsibility to keep this data private?” Pittman asks. “Is it reasonable to expect that our individual claims to privacy extend to a company we've willingly transferred our data to?

“Or, is this simply a sign of the inevitable transition from the Information Age to the Virtual Age? Maybe our concept of information and privacy is what needs to change.”

Trends in Computer Science Programming: It’s All In the Script - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2821

Speed is king in today’s programming environment. And that means powerful, object-oriented programming languages may be losing some of their longtime dominance, says Dr. Eric Sabbah, chair of the computer science program at Capitol Technology University.
bachelor's in computer science student“Scripting is more on the rise – Python, for instance,” Sabbah says. “Object-oriented programming is still a big thing but the momentum is really with scripting now. It’s easier to learn and quicker to write.”

Choosing the right approach depends on the scale and complexity of the task, he notes. For many relatively simple tasks, scripting makes the most sense.  For more complex situations, it’s best to turn to a language like Java or C++.

According to Sabbah, a similar trend towards speed and ease of use is being seen in the database programming arena. Although the longtime standard, SQL, still reigns supreme, simpler alternatives such as JSON are gaining more traction.

“In general, we’re seeing a tendency to sacrifice the super-efficient, well-tested enterprise solutions in favor of a ‘let’s do this quickly’ type of approach,” Sabbah says.  “While the more robust solutions are actually quicker and more efficient once you have them in place, they require more effort upfront.”

“When you’re driven by production deadlines, there’s a tendency to want to go for the solution that can be implemented most swiftly – even if it’s less efficient in the long run.”
The take-home for aspiring computer scientists: opportunities exist for different kinds of programming expertise. Scripting is easiest to learn and may be the quickest way to get a foothold in the industry – but broader expertise is valued too.
Capitol, Sabbah says, reflects the increased diversity of the field in its programs. For those seeking to build a deeper theoretical background, a bachelor’s degree in computer science is still the best fit. But the university also offers programs in software engineering and web development, which equip students with the in-demand coding skills they need in today’s deadline-oriented, fast-paced business environment.
“There are many paths available in computer science,” Sabbah says. “Our programs reflect the variety that characterizes the field today.”

Tuesday, November 28, 2017

Online Shopping: Dos and Don’ts - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2811

Convenient to your door delivery, multiple product reviews at your fingertips, and the promise of grabbing that sale without having to compete in an Olympic-sport-like wrestling match for the last of this season’s hottest item? It’s no wonder more people are choosing to do their holiday shopping online.
But with large data breaches on the rise, like the recent breaches in security with Equifax and Uber, consumers have the right to be concerned about the safety of their information once it hits the internet.
So what are some steps online shoppers can take to help safeguard their data and protect against theft? We asked our Capitol cybersecurity professors for their thoughts:
Dr. William Butler, chair, DSc, cybersecurity program
  • DO: Use a card that has a good dispute resolution process.
American Express, from what I hear, is one of the best – if you dispute something, they’ll reverse it. Some people have a card that they use specifically for online shopping, so that if there’s a dispute on the charge, they don’t have to go through a lot of rigmarole.
  • DON’T: Use websites that want to store your credit card information.
If you have the option, don’t store your credit card information, unless you really like that convenience, because that’s where most of them are getting compromised during the breaches. It’s convenient to store your credit cards on the websites you use the most, but then again that’s where the compromises have happened. With sites like Uber, and others that didn’t report breeches, people’s credit card numbers are out there.
Dr. Jason Pittman, DSc, professor, cybersecurity program
  • DO: shop online without fear.
Retailers do their best to protect purchases and the probability of compromise is low given the amount of companies and sales during this season
  • DON’T: shop online by clicking on links in emails.
Browse directly to the retailers you want to visit to avoid phishing attempts. Yes, your coupon will still apply.
Professor Rick Hansen, cybersecurity program, Cyber Battle Team Coach
  • DO: Always look for the picture of a lock when you’re shopping online.
It signifies a secure site. If you’ve never been to the site before, click on that lock in order to find out more about the site’s security. When you go to the shopping cart, you’ll see that lock. It ensures that you’re on a site that has secure transmissions. If you’ve never been there before, or if it looks sketchy, you can click on the lock and find out more about the connection.
  • DON’T: Click on the links if you receive an e-mail that looks legitimate but is from someone you don’t know.
Most of the time you can hover over the links and see what URLs they actually go to. Say you get an e-mail that looks like it’s telling you about a special offer on Amazon. Don’t necessarily assume it’s really from Amazon – check the identity of the sender. You can do this, on many e-mail clients, with a right mouse click and see what the name is. Sometimes you’ll get sent a link that’s tagged “Amazon.com” but when you investigate the link, you see that it’s actually going to Bob’s Towing.
Keep these Do’s and Don’ts in mind for a safe, secure, online shopping experience this holiday season.

Monday, November 27, 2017

Be on the Alert for Holiday Cybercrime, Urges Professor - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2806

It’s that time of year -- holiday season. That also means cybercrime season. Black hat hackers are on the prowl as we approach the busiest shopping season of the year.
Many companies make as much as one quarter of their annual revenue during the last three months of the year, according to Symantec. Cyber criminals – always on the lookout for opportunities to exploit vulnerable systems and unsuspecting users – often have extra leverage during these critical shopping days.
As hackers continue to perpetrate spectacular data breaches, striking government agencies, corporations, cities, and private citizens with alarming regularity, companies are spending millions to defend themselves and rapidly recover from such attacks. But what can you do to protect yourself from cyber attacks?
According to the chair of Capitol Technology University’s cybersecurity program, Dr. William Butler, there are steps each of us can take in order to avoid becoming a victim.
“Make sure your anti-virus software (AV) software is up to date, use only strong passwords and vary them across websites, make sure you are using your browser in secure mode only, and back up your data regularly and store in a safe place (for example on a cloud drive),” Butler recommends.
But what if you take precautions and are successfully targeted anyway? According to Butler, it’s important to get in touch right away with the proper authorities so that they can investigate.
“If you fall victim to ransomware attacks and other cybercrimes such as identity theft you should immediately contact the Internet Crime Complaint Center (IC3).” Butler says.
The IC3 is co-sponsored by the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C).  For additional information, check out the FBI Page for holiday scams warnings: http://www.fbi.gov/scams-safety/e-scams.
“Remember your personal data or computer should be considered your personal critical infrastructure and should be guarded accordingly,” Butler says. “Shop safe, shop smart, and happy holidays!”

Friday, November 24, 2017

Cyber Analytics degree will position you for a fast-growing field - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2801

When a new career path opens up, it’s nice to get there before the crowd.
 Right now, companies and organizations face a critical need for professionals who can use cyber analytics skills to stop breaches before they occur – thus protecting sensitive data and avoiding the business losses and lowered customer confidence associated with a cybersecurity incident.
They are looking for individuals who not only understand cybersecurity, but are fully at home in the world of data. That means fusing two sets of skills that traditionally have belonged to different domains within education – cyber and business analytics.
“The demand for this combination is unbelievable,” says Dr. Helen G. Barker, vice president for academic affairs at Capitol Technology University. “Because of the lack of degree programs and other avenues for training, companies have had to train their own teams to do this internally. There hasn’t been anything out there that combines cybersecurity and analytics.”
Until now. Starting in Fall 2018, Capitol will be offering a new master’s degree program in cyber analytics, designed specifically to equip students to meet this rising industry need. Like all graduate programs at Capitol, the new master’s degree program in cyber analytics will be offered entirely online.
Protecting company data and assets has traditionally been the job of cybersecurity specialists, who rigorously test networks to locate vulnerabilities and deploy recovery procedures in case a breach happens. With the volume and sophistication of attacks on the rise, however, interest is growing in a new approach – one which uses analytical tools to identify patterns that could be indicative of a coming breach.
Cyber analysts combine cybersecurity skills with the analytics knowledge needed to identify such patterns. This powerful combination offers the hope of stopping cybercriminals and adversaries before they can act.
Students in Capitol’s Cyber Analytics program “will learn to think like the hacker and beat them at their own game” said Professor Soren Ashmall, who is associate director of master’s programs at Capitol and part of the planning team for the new degree.
Capitol will be working with key players in the cyber and analytics industry, including software giant SAS, to shape the curriculum and resources. SAS was on the Capitol campus Friday (November 3) to discuss with students the rising demand for analytical talent in technology and business.
SAS is interested in working with schools like Capitol that are educating a corps of professionals with both technical and analytical expertise. “We have the technology and the tools” said SAS analytics consultant Andre’ de Waal, “So we’d like to make our tools and technology available to universities so that you can be exposed to the tools and analytics, so that when [students] get to the workforce they are ready to succeed without the companies having to go for further training.”
Classes in the cyber analytics program will begin in September 2018, but the program is open for enrollment now. For more information, contact the Graduate Admissions office at Capitol: gradadmit@captechu.edu.

Thursday, November 16, 2017

The future is here: learn about brain-machine interfaces at Capitol workshop - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2591


Imagine being able to operate your computer without needing a mouse or a keyboard, by controlling it directly with your brain.

Imagine using your thoughts to adjust the temperature settings in your home, change channels on your smart TV, play the new Taylor Swift single, or turn on the lights.

Sound like sci-fi fantasy? Once, it would have been. Now it is becoming reality, as a result of brain machine interfaces (BMI) – an emerging field of technological research that is generating intense interest. Capitol Technology University, home to one of the nation’s most highly regarded cybersecurity programs, will be providing an opportunity for young people to learn about brain machine interfaces and even to try them out for themselves.

The university’s popular Cyber Saturday program – aimed at community college students – will focus on BMIs during sessions in February, March, and April. Click here to register or e-mail cybersat@captechu.edu for more information.

“We’re going to introduce brain machine interfaces to students and have them engage in a variety of activities – controlling computers, playing games, and operating various devices,” explained cybersecurity professor Dr. Jason M. Pittman, who is spearheading the initiative together with Dr. Garima Bajwa of the engineering department. “We’ll also be teaching them about the cybersecurity aspects that come with this new technology.”

The program is part of a federal grant Capitol has received to conduct research into brain machine interfaces – and into the host of potential security issues that they raise.

Linking brains to computers can bring about enormous benefits and conveniences, but also opens up new avenues for criminal or malevolent behavior, he said. Malware could potentially be employed that gives adversaries direct access to their victims’ thoughts.

“Imagine the Equifax breach, but in the context of your thoughts,” he said. “Someone’s not breaching a company to steal data that’s on the hard drive. Rather, someone’s seeking to backchannel an EEG device so they can read your thoughts while you are thinking them.

Dr. Bajwa and Dr. Pittman hope to help mitigate these risks through their research, which is focused on authentication -- that is, on ensuring that BMI-controlled devices can only be controlled by the intended user, and that the user’s thoughts are controlling only the intended devices.

“A new paradigm is emerging for how we interact with machines, and along with it comes a new paradigm for criminal action,” Pittman said. “With this capacity-building grant, Capitol is helping to map out this new and largely uncharted territory.”

Interested in exploring BMIs? Contact the cybersecurity program at cybersat@captechu.edu to learn more about the upcoming Cyber Saturday workshops, or register here.


Capitol Technology University Degrees Offered Fall 2017 - Capitol Technology University (Since 1927 Located Near Washington D.C.)

https://create.piktochart.com/output/26110356-capitol-technology-university-degrees-fall-2017

Visit Capitol Technology University: www.CapTechU.edu

Wednesday, November 15, 2017

Analytics Demand Spurs New Programs at Capitol - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link:  https://www.captechu.edu/node/2786

It's a field where employer demand is high and opportunities are burgeoning, industry representatives say. Private businesses and the public sector both have a pressing need for individuals with analytics expertise.

“As everybody knows, there’s a huge shortage of analytical talent out there and some estimates are that millions of students will be needed," said SAS analytical consultant Andre’ de Waal during a visit to Capitol on Friday (November 3).

De Waal and other representatives of SAS, an industry leader in analytics software and services, gave presentations to Capitol students and also met with the faculty to offer input into new analytics programs that are being offered at Capitol starting in Fall 2018.

A master's program in cyber analytics will educate professionals in harnessing the power of data to stop malicious hackers and cybercriminals in their tracks. Also at the graduate level, Capitol is unveiling a technical MBA in business analytics.

Meanwhile, undergraduate students at Capitol can now major in business analytics and become experts in data-driven decision-making, an increasingly pivotal skill set in today's business environment.

Qualified professionals in the field are in short supply and companies ranging from industry giants to emerging startups areo technology pioneers are looking for students with these specializations, De Waal explained. SAS, he said, sees a mutually beneficial relationship in assisting unversities like Capitol with developing analytics programs.
Andre de Waal, analytics consultant, SAS“We have the technology and the tools. So we’d like to make our tools and technology available to universities so that you can be exposed to the tools and analytics, so that when [students] get to the workforce they are ready to succeed without the companies having to go for further training," De Waal said.

Preparing students for the workforce through hands-on training and collaborative learning has long been a cornerstone of Capitol Technology University’s approach to technology education. Capitol was also one of the first institutions of higher education to offer an academic degree program in cybersecurity, making the university a natural fit for the emerging cyber analytics field.

In 2010, it launched the nation's first cybersecurity doctoral program. Capitol’s program is a DHS and NSA-designated Center of Excellence in cybersecurity education.

With the volume and sophistication of cyber attacks on the increase, many see analytics as a way to keep ahead of potential adversaries. “It opens up the possibility of predicting malicious behavior before it happens,” Sarah Alspaw, Director of Career Development and Student Success, said. “As many companies and organizations have learned, pre-empting an attack is far less costly than cleaning up after one."

To learn more about our upcoming programs in business and cyber analytics, contact the admissions department at admissions@captechu.edu or phone 800-950-1992

Cybersecurity Skills and Tools: What You Need for Success in the Field - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2791

With massive breaches of sensitive data in the news daily, the cybersecurity profession has entered the public spotlight as never before. Career opportunities remain plentiful, with demand far outstripping supply. What are the critical skills that an aspiring cyberwarrior needs for success? And what are some of the most common tools used in the field?

“From a beginner’s perspective, learning the Kali Linux operating system is something that can have a great impact,” says Dr. William Butler, chair of the cybersecurity program at Capitol. “This is a variant of Linux that was designed for penetration testing. It comes with a menu of pre-installed tools, such as Nmap and Nessus, which are designed to detect network vulnerabilities. Bachelor’s in cybersecurity students here at Capitol use many of these tools during their introductory courses.”

Students are then introduced to other tools such as Wireshark, which allows them to capture and analyze packets in order to determine what data is in them, and what sorts of commands they might contain, he said.

Cybersecurity students also learn to use forensic tools – the same tools used by police investigators or the FBI to solve cyber crime and criminal cases – in order to examine code hidden on a computer’s hard drive or in memory. Capitol courses and labs include experience with the Encase forensic toolkit, regarded by many as the gold standard in the field, as well as Oxygen forensic software and Cellebrite data extraction and analysis tools.

All these tools help cybersecurity pros retrieve valuable data, but the process doesn’t end there. Data must also be analyzed. Teaching students to do that is a vital component of cybersecurity education.

A solid background in computer programming is an asset for anyone aiming to enter this exciting, high-demand field, Butler said. “You’re dealing with enormous quantities of data. To have the ability to organize that data, analyze it, and draw conclusions, you need a scripting language such as Java or Python. Programming languages such as C are also in high demand.”

Wednesday, November 8, 2017

Launching Your Career In Astronautical Engineering: Tips and Recommendations - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/2736

Fascinated by space and satellites? Aspire to a career in the field? The first step, of course, is to gain an education with the right credentials – such as an astronautical engineering degree from Capitol Technology University. But what about the next step? What needs to be done in order to get your career off the launch pad?
We asked Dr. Alex “Sandy” Antunes, associate professor of astronautical engineering at Capitol. He’s mentored dozens of students and seen their careers progress, starting from entry level flight ops positions to higher-level roles in administration. While no one formula works the same way for everyone, Antunes says, most astronautical engineering career paths involve the following steps.
  • Obtain hands-on experience. Understanding theory is good. Being able to apply it is even better. Capitol provides abundant real-time experience to students in the form of projects such as the CACTUS-1 CubeSat mission. That practical experience adds up to greater hireability, Antunes says. “Employers know they won’t have to spend three to six months getting their new employee up to speed.”
  • Build your network. Many, if not most, career opportunities in the field come about as a result of contacts and connections.  At Capitol, astronautical engineering students benefit from the university’s close connections with NASA and private contractors. “We have built a really strong network in this field” Antunes says. “As a result, we have students who are placed in internships that are not announced to the general public. We have people on our advisory board who visit campus regularly to tell us about job openings. Many of our faculty come from NASA-Goddard or from local contractors, and they can help students identify the best avenues for their careers.”
  • Take advantage of internships. “These allow you to ‘try before you buy’ and get a clear idea of what a specific type of job entails on a day to day basis,” notes Antunes. “Without internship experience it can be hard to know exactly what the best fit is for you.” Internships also enable students to make contacts within organizations and build their networks (see “Networking is essential,” above).
As a “fresh-out” (newly graduated student), you’ll most likely be working in flight ops or hardware integration, and your employer will probably be a contractor rather than the federal government, Antunes says. “We highly recommend that graduates go for these entry-level jobs. It gets them in the door, into a team environment, doing hands-on space stuff. Eighty percent of jobs at NASA-Goddard are with contractors; federal employees typically manage and administrate. Starting with a contractor also has the advantage of extending your reach, because they work with multiple entities – not only NASA, but the DoD and other federal agencies.
And what if you go into astronautical engineering only to discover that you’re really not all that crazy about space? “The great thing about the degree is that you’re also an electrical engineer (EE) and a systems engineer,” Antunes says. “So even if satellites aren’t your thing, it’s not that hard to make a switch.  One way or another, there’s a market out there for your skills and knowledge.”
RockSat-X Launch Photo Courtesy of Marissa Jagarnath

Tuesday, November 7, 2017

Industry Leader Visits Capitol as New Analytics Programs Announced - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: http://bit.ly/2Aiw1Kg

The Capitol community recently welcomed SAS representatives to our campus for a special event this past Friday (November 3). SAS, a current industry leader in analytics software and services, came out to discuss the rising demand for analytical talent in technology and business.
Students who attended the event were able to gain a better understanding of the current lack of people resources available to companies regarding analytical needs, what analytical business and cyber analytics programs might involve, and the demand for these skilled workers in both government and industry positions.
Andre de Waal, analytics consultant, SASSAS analytical consultant, Andre’ de Waal had this to say on the current lack of analytical professionals, “As everybody knows, there’s a huge shortage of analytical talent out there and some quotations are like in the millions of students that will be needed in industry employed in analytics.” Many companies, from traditional businesses to technology pioneers are looking for students with these specializations. The IRS came out to speak about the need for analytics professionals in government industries.
De Waal went on to say that SAS sees a mutually beneficial relationship in assisting universities like Capitol with developing programs in analytics. “We have the technology and the tools. So we’d like to make our tools and technology available to universities so that you can be exposed to the tools and analytics, so that when [students] get to the workforce they are ready to succeed without the companies having to go for further training.”
Preparing students for the workforce through hands-on training and collaborative learning has long been a cornerstone of Capitol Technology University’s approach to technology education. Starting in Fall 2018, the university is launching a master’s degree program in cyber analytics and an undergraduate degree program in business analytics.
Starting a cyber analytics program is a natural fit for Capitol in many ways. Given the university’s longstanding engagement with cybersecurity, we are in a unique position to prepare our students to become the pioneers of the field. Capitol was one of the first institutions of higher education to offer an academic degree program in cybersecurity. In 2010, it started the nation’s first doctoral degree program in the field. Capitol’s cybersecurity program is a DHS and NSA-designated Center of Excellence in cybersecurity education.
With the volume and sophistication of cyber attacks on the increase, many see analytics as a way to keep ahead of potential adversaries. “It opens up the possibility of predicting malicious behavior before it happens,” Sarah Alspaw, Director of Career Development and Student Success, said. “As many companies and organizations have learned, pre-empting an attack is far less costly than cleaning up after one.
To learn more about our upcoming programs in business and cyber analytics, contact the admissions department at admissions@captechu.edu or phone 800-950-1992