Blog

Posted by raherschbach on 19 Apr 2018

In the wake of a natural disaster, the last thing anyone wants is further injury or loss of life. First responders put themselves at risk to aid victims, often without knowing the extent of the situation before they go in.

Enter unmanned systems.

Unmanned systems are capable of aiding first responders by helping them to monitor events as they unfold, and to find victims in need of help in potentially hazardous situations, without the further risk of human life.

According to unmanned systems expert Dr. Richard Baker, “Unmanned systems are used in disaster response and management for monitoring the actual event, whether it’s a tornado, a hurricane, or an earthquake. These vehicles can become essential to identify and provide situational awareness to the incident command.”

The use of these systems is also often a saver of critical time: “They let responders know which roads are closed or open, where people are that need help immediately, and allow them to be able to assess the situation and get that assistance out there faster and easier to an area where it really needs to be taken care of. Rather than doing the search by individuals on the ground, a lot of the initial searches are done by vehicles in the air,” says Dr. Baker. “And you can use ground vehicles to deliver assistance, or open pathways or whatever needs to be done.”

Unmanned systems are any electromechanical system which has the ability to carry out a predetermined or described task, or a portion of that task, and do it automatically with limited or no human intervention. There are many different types of unmanned systems, including aerial, ground, underwater, and even space vehicles.

Beyond disaster relief, first responders are also beginning to use unmanned systems to aid them in their everyday tasks. Dr. Baker says, “They use them today in public security, law enforcement, and search and rescue. The national parks services and the coast guard are also using them.”

“Search and rescue uses them quite a bit,” he continues, “anything from human body detection to simple things like a lost child in a cornfield can be detected very easily by an overhead vehicle. They can actually not only use them for detection, but if there are some people there that are hurt they can do an air drop to provide medical supplies, or other supplies they might need in an emergency.”

Even insurance companies coming in post-disaster to assess damage and begin the rebuilding process are starting to use unmanned systems. “The insurance companies and risk management are looking at using robots to go in and do an assessment immediately after a disaster and see what needs to be fixed and who needs help, and if people need dispatched to an area,” says Dr. Baker.

From bomb diffusing robots to package delivery drones dropping life vests to people trapped by flooding, it’s difficult to deny that unmanned systems are improving the lives of first responders and the people they save.

To learn more about Capitol’s unmanned systems programs, check out: Unmanned and Autonomous Systems and Unmanned and Autonomous Systems Policy and Risk Management.

 

Blog

Posted by Anonymous (not verified) on 18 Apr 2018

The TV series Star Trek: The Next Generation famously featured a synthetic life form named Data. It was an apt choice of name for a major character in this future-oriented show.

cyber analysts predict and protect from future cyber attacksIn our real world today, data – whether in the form of personal information or the numbers used to drive business decisions – has become the central protagonist, one impacting every facet of our lives.

It’s no wonder, then, that cyber breaches are increasingly focused on acquiring data – as opposed to the more old-fashioned, even quaint, goal of skimming revenue or extorting payment. In the Uber breach, disclosed in November 2017, the phone numbers, e-mail addresses, and names of 57 million users were exposed. The Equifax breach compromised millions of social security numbers.

Hospitals are among those being hit the hardest, with their cloud-based storage systems being hacked to steal patient medical records. According to a study published in the American Journal of Managed Care (AJMC), hospital data breaches accounted for 30% of all incidents reported to the Health and Human Services department’s Office of Civil Rights, which operates a breach portal.

The good news? While data is a coveted target for hackers, it can also be used to predict and thwart attacks.

Cyber analytics is a rising field that adds descriptive, diagnostic, predictive, and prescriptive tools to the existing methods used by cybersecurity professionals to seal off vulnerabilities. Dr. Mary Margaret Chantré, assistant professor of cyber security and cyber analytics, defines it this way, “Cybersecurity is about the ability to be resilient to attacks and recover quickly. A cyber analyst looks at mistakes made in the past and tries to avoid them in the present so he/she can predict possible future attacks. This type of situational awareness helps minimize risk."

In examining threats, cyber analysts not only use traditional methods of statistical analysis – identifying a normal distribution pattern and then recording signification deviation – but also machine learning and algorithmic-based techniques, such as clustering and density estimation to better understand how to fortify your data.

Capitol Technology University is one of the universities paving the way for cyber analytics. Our programs at the undergraduate and masters levels are among the first in the country, aligning with the university’s pioneering tradition. Capitol, in fact, was one of the first institutions of higher education in the world to offer an academic degree program in cybersecurity, a field which is now high-priority for many schools, colleges, and universities. In 2010, Capitol started the nation’s first doctoral degree program in the field.

Get to know Data. Though the Star Trek series has long now entered reruns, he’s not going away. With a degree in cyber analytics from Capitol, you’ll be prepared to leverage data to take on cyber adversaries as fearsome as any dreamed up by Gene Roddenberry.

 

Blog

Posted by raherschbach on 17 Apr 2018

By Dr. Alex "Sandy" Antunes
Professor, Astronautical Engineering

Can anyone launch a satellite? Only in the sense that anyone can fly an airplane -- as long as they train up, get the proper license, and get clearance to take off each time.

One satellite start-up just might have skipped that middle step in their path to orbit, however.  At least they earn the distinction of being (if proven) the first unauthorized satellites ever launched by a US company.

The facts are that a US startup company in 'stealth mode' called Swarm Technologies was turned down for their FCC license, but launched a month later anyway, on the Indian Space Agency's ISR0 rocket. Their SpaceBee-1, -2, -3, and -4 were smaller than CubeSats and listed as (from IEEE) '“two-way satellite communications and data relay” devices from the United States. No operator was specified, and only ISRO publicly noted that they successfully reached orbit the same day.'

One of the hardest tasks for our Cactus-1 CubeSat is the FCC paperwork. It was easier winning our launch bid than figuring out the FCC spec. There are forms, mandatory software, affidavits needs from local operators -- we submitted our application in December and still spend half a day a week working on the next FCC steps.

I would love to be able to 'ignore' the FCC like Swarm Technologies allegedly did, but that happens to be illegal -- and for good reason.  The reason for licensing is twofold: to ensure no satellite interferes with emergency or broadcast services, and to minimize orbital risk from too much small 'space junk' potentially being in orbit.  Information indicates the SpaceBees were so small, the FCC was concerned with not being able to track or manage them.

This is actually an international compliance issue.  Each satellite-using country coordinates via the UN's International Telecommunication Union (ITU) -- the FCC is just the US's agency.  If we didn't coordinate, not only would we be putting other missions at risk, not only would other missions be allowed to interfere with our communications, but emergency services and aircraft world-wide would be put at risk by errant broadcasters and uncoordinated transmitters.

I've written before on the risks of bad actors in the new space age we're in, because compliance is a tricky thing. It's arguable that the greatest achievements of Scaled Composite's SpaceShipOne and SpaceX's Falcon-1 rocket were not just technical but were in breaking the 'paperwork barrier' that made it very hard for independent companies to try for launch. They succeeded through persistence and lobbying, not just flat out ignoring international regs.

If you're a US citizen or US company, you have to follow US law -- even if the paperwork is hard, it's got a reason for existing. Unfortunately, this one bad actor could result in more scrutiny and more paperwork now for the rest of us. This company didn't just ignore a requirement, they were told 'no' and went ahead anyway. This is the CubeSat 'drone on the White House lawn' level of idiocy, where a selfish user ends up making it harder for everyone else who is complying.

So far, there hasn't been a clear restriction on future flights.  Our own Cactus-1 FCC license is still processing without any extra stress. Space is big, but not big enough for bad actors.  Let us hope this is a one-time anomaly, that no other space company will run afoul of some FCC or NOAA regulation. Wait, what? NOAA has a problem with SpaceX's rocket cameras? 

Stay tuned for the next blog post -- on who can take pictures from space.

Blog

Posted by raherschbach on 16 Apr 2018

Dr. Jason M. Pittman, Sc. D., is a scholar, professor, and cybersecurity thought leader. He currently is on the full-time faculty at Capitol Technology University. This is part two of an ongoing series on privacy.

Previously, I made the assertion that privacy, while necessary in the present, is ultimately bad for our future. I do recognize the boldness of my claim. Thus, I want to exercise due care in laying down the groundwork for the full argument.

Photo of Dr. Jason Pittman lecturingOver the course of this essay series, I will present my reasons as to why privacy must end. First, I will demonstrate why privacy is unnatural. This is contrary to mainstream opinion of course and much of the basis for the definition of privacy as well. Second, I will show that privacy is a proxy for a different problem. More aptly put, privacy is a descriptive label assigned to a host of underlying, root issues that ought to be addressed separately. Third, I will reveal privacy as a restrictive mechanism that directly impedes both individual and social growth. That is, privacy only keeps us as free as the walls in a zoo impart freedom unto the animals. Finally, and most importantly, I will establish that privacy produces a cumulative negative value for individuals and the species (human).

Why would we continue engaging in behavior that results in a worse situation then we currently find ourselves?

Foremost, we need to understand why there is high demand for privacy. Yes, this presupposes that there is high demand for privacy, but I feel safe in this presupposition given the overt evidence in the pop dialectic. That is, all the research -- the interviews, the reading, and the presentations -- points towards three aspects of privacy that result in the high demand we see nowadays. These are parity, currency, and permanency of information. Understanding the demand for privacy does not necessarily develop an understanding of privacy however.

Thus, there are fundamental principles that ought to be considered that will lead us towards a definition of privacy. This means that we need to develop a working comprehension of concepts such as intrusion, seclusion, limitation, and control. I am doubtful that your definition of privacy will match a singular principle in this list. Rather, I have found that modern privacy is an amalgamation of these principles. Such comprehension invariably will lead us to ponder where privacy originates (i.e., how do we know privacy) the relative merit of privacy; whether privacy is flawed for example.

As a matter of fact, I now perceive privacy, in all the potential amalgamated definitions, to be deeply flawed. I will share with you the deficiencies in privacy that I have uncovered. The flaws I intend to discuss are privacy as a zero-sum heuristic, privacy as an anthropomorphism, privacy as declines, and privacy as a perception.

I do not hesitate to mention that these defects are exceedingly catastrophic to the case for privacy. Nevertheless, my viewpoint only represents the conclusion I have reached. I would be remiss to inculcate this view of catastrophic flaw in privacy without first offering you a deeper explanation as to why I think privacy is bad. The explanation here is the same as for why privacy must end, thus we have come full circle.

Full circle is not automatically the end of the conversation, however. If I have convinced you that privacy must end, I want to provide some transparency into what I feel we can do to rid ourselves of privacy. Much of my thinking involves using technology to re-balance the overarching information equation. The other parts of my answer to privacy involve tearing down and rebuilding the human mind as such relates to the underlying privacy pathology.

To be sure, the going will be hard. I honestly do not have all the answers. However, I do think we can find the right questions together.

Blog

Posted by raherschbach on 13 Apr 2018

Interest in blockchain has escalated -- and the immediate reason isn't hard to pinpoint. Bitcoin and other blockchain-based cryptocurrencies have been in the news ever since a dramatic price spike (and subsequent decline) late last year. This month, Bitcoin surged again, gaining $1,000 in value within one hour.

Blockchain uses distributed ledger technology in order to validate transactions without the need for a trusted third party, such as a payment processor.

But blockchain technology's significance goes well beyond currencies. Many see it as a potentially revolutionary innovation with an abundance of possible uses: from managing medical records to streamlining product supply and distribution.

Cybersecurity professionals, meanwhile, are eyeing blockchain's potential to aid in the fight against cybercriminals and adversaries. Because blockchain gets rid fof the middlemam, it removes one possible weak link in terms of security, As Forbes magazine reports, "by leveraging a distributed ledger and taking away the risk of a single point of failure, blockchain technology provides end-to-end privacy and encryption while still ensuring convenience for users."

In short, blockchain -- once grasped only by the few -- is quickly turning into a game-changer you can't afford not to understand.

Not sure where to start? Capitol Technology University's next Cyber Saturday can help you master the fundamentals. The next session of Capitiol's popular event series, designed for high school and community college students but open to anyone with an interest in computers or gaming, will provide an introduction to blockchain and the intriguing world of digital currencies.

A cybersecurity professional will be your guide for this presentation, part of a full morning of exciting Cyber Saturday activities at the McGowan Center on the Capitol campus. The event starts at 9:00 am and lunch will be provided before an afternoon session of Capture the Flag and other fun activities traditionally held as part of the Cyber Saturday program.

Cyber Saturdays are mainly intended to be fun, while at the same time involving skills utilized in cybersecurity, one of today’s most in-demand fields.

“These events increase awareness and then they get students interested in the [cybersecurity] profession,” says Dr. William Butler, chair of the Cybersecurity program at Capitol.

Cyber Saturdays have been a recurring event at Capitol since 2013. Meghan Young, director of admissions, says the program has been highly popular.

"Capitol is in an ideal position to offer events like these because of our designated Cyber Lab and our faculty who take the time to make learning fun and interesting,” Young said. “It gets better and better each year."

The event is free, but registration is requested ahead of the event. Inrerested in attending? Register here or contact cybersat@captechu.edu for more information. To reach the program by phone, call 240.965.2458 or 813.495.4536.

Event details:

9:00-10:00 am: Welcome to Capitol
10:00-11:00 am: Blockchain fundamentals
11:00 am -- 12:00 pm: Wireless routers and hacking
12:00-1:00 pm: Lunch and networking
1:00-2:00 pm: Capture the Flag and King of the Hill competitions

Location: McGowan Center, Capitol Technology University, 11301 Springfield Road, Laurel, MD.

Directions

 

Blog

Posted by Anonymous (not verified) on 11 Apr 2018

On any given day, each of us will put our smart phone to a myriad of uses. We may use it to shop. Communicate with colleagues, friends, and family. Check the weather ahead of a plane trip. Monitor stocks. Track our daily exercise routine. Check out the latest track from our favorite artist.

students controlling a satellite with a mobile phoneHow about using your mobile phone to command and control a satellite in orbit high above the earth?

Not only is it possible in theory, but a group of Capitol students has devised a practical way to put it into practice. The students’ endeavor – dubbed Project Hermes – has attracted attention from space scientists and engineers, along with coverage in media outlets such as The Baltimore Sun.

 “I thought it was very clever and inventive on their part,” The Sun quoted David Kusinerkiewicz, chief engineer at John Hopkins University’s Applied Physics Laboratory (APL), as saying. “I can picture somebody sitting in a Starbucks on their smartphone talking to their satellite and getting data back. It’s a pretty cool concept.”

And the concept has been tested. In 2015, Project Hermes enjoyed its first successful space flight aboard a NASA rocket. Team members waited expectantly – then exulted as letters appeared on their cell phones, sent by the payload high overhead. The concept was tested again, with successful results, at NASA’s RockSat-X program in the summer of 2017.

Now another momentous milestone awaits: going into orbit. Integrated into a combined Capitol satellite project known as Cactus-1, Hermes was selected for NASA’s CubeSat Launch Initiative (CSLI), with lift-off expected in the coming months.

Real-time interaction using mobile devices has the potential to transform satellite operations, says Capitol professor Risabh Maharaja, whose idea – presented during his Introduction to Space class – was the genesis of Hermes, with students then developing a way to put it into practice.

Currently, he notes, operations are limited by a satellite’s footprint; commands can only be given, or telemetry received, when a “bird” is within view either of a ground station or relay satellite. The Hermes approach, which utilizes the Iridium constellation of interlinked communications satellites, changes all that. Mission control “could maintain communication using commercial satellites with ordinary internet TCP/IP, with potentially higher bandwidth and quicker response times than conventional methods," Maharaja explains.

Hermes is only one example of the hands-on engineering projects that Capitol students become involved with from their first year at the university. The school’s educational approach stresses immersion in practical projects from year one – a philosophy that distinguishes Capitol from many other colleges and universities, where students do not gain such exposure until their junior or senior years.

Other student-led projects at Capitol include TRAPSat, which is exploring a method of capturing space debris using Aerogel, and Project Aether, which is investigating auroral effects on the atmosphere while also testing new insulation system and comparing data rates from multiple sources.

Gaining such practical experience is a major asset for aspiring space systems engineers as they prepare for a career in the industry, students say.

“Everything that we’re doing here benefits the students and is helping us look better when we go out into the job market,” says Hermes flight software specialist Christopher Murray. “Not many people in a job interview can honestly say that they have participated in designing a payload that went up into space.”

Dream of a career working with rockets, satellites, and space? With a Capitol degree, the dream is within reach. Find out more about our unique program in astronautical engineering, or contact admissions@captechu.edu

 

Blog

Posted by raherschbach on 10 Apr 2018

By Dr Jason M. Pittman, Sc.D.
April 6, 2018

Previously, we discussed synthetic intelligence as a serious field of inquiry and, separately, what constitutes intelligence. Both are foundational topics with application in growing avenues of scholarship such as computer science, computational neuroscience, cybersecurity, and of course artificial intelligence. Later, we’ll use our foundation to begin constructing an understanding of not only how a synthetic intelligence can emerge but also how we can interact with such intelligence in a safe and trusted manner. However, the foundation is not yet complete.

Intelligence alone, synthetic or otherwise, does not provide the means to act. In part, such a claim summarizes a core issue with artificial intelligence related research. That is, the expression of intelligence is imitated without a sense of how the intelligence is perceiving itself. Indeed, without agency, I would suggest that intelligence lacks the facilities alone to interact with reality. In some ways, that tells us what agency is- an intent to interact with the world as an expression of intelligence. Agency, however, exists in an odd, paradoxical space defined almost exclusively by assumptions.

Perceiving agency is not without issue. That is, we act as if our actions are the result of intentions. As well, we intimate to ourselves (and others!) that such intentions originate internal to our intelligence and freely so without predetermination. Likewise, we are aware of the intention to act although we may not be fully aware of when such intention emerges within our consciousness. Let’s assume this to be universally true, particularly the awareness clause.

We can examine three questions now. Did you intend to read this sentence? As well, did you intend to do so exactly at the moment that you did? Lastly, when did you become aware that you had an intention to do what took place?

Such questions cut to the heart of the agency paradox and the potential for engaging with a synthetic intelligence. Consider for a moment that your answers to these questions are, “yes,” “yes,” and “when I read the sentence.” Perfectly reasonable responses that I suspect accurately portray how most of us would respond. In fact, we perceive agency in others as a signal that their behavior is intelligent. There seems to be an innate assumption that your behavior is intelligent because I perceive my behavior to be intelligent. Thus, I assume you have agency because I assume my intent to act has agency.

Here’s the problem: agency can be illusory. In other words, what we perceive to be agency is in fact not agency at all. The illusion of agency in an external context has been well researched. Likewise, the illusion of internal agency has been demonstrated in simulation and practice. Thus, we need to think about how agency in a synthetic intelligence might be possible and how could we potentially detect or measure agency in a synthetic intelligence.

The most obvious instrument would be the renowned Turing test. However, I have concluded that the Turing is insufficient to properly detect intelligence and agency in synthetic intelligence. Check back in two weeks for my explanation as to why we won’t be able to trust the Turing test!

Blog

Posted by raherschbach on 9 Apr 2018

By Sarah Alspaw, Director of Career Development and Student Success

Mentors are here to guide you and encourage you. They can help you avoid mistakes, help give you clarity, help you brainstorm new ideas, and help you be the best you can be.

If you want a mentor, there are a few places you can find one (or a few):

FACULTY

Your faculty are great mentors, inside and outside of the classroom. Faculty often have industry experience doing the exact job you want to do after graduation, especially adjunct faculty, who are working full-time in your field. Ask them questions, ask for guidance, or maybe even ask if they know where to find good internship or job opportunities.

PEERS & CLASSMATES

Your peers. Just because someone is the same age or even younger than you does not mean they can’t teach you anything. Are they especially good at penetration testing, or soldering, or using testing equipment? If so, they can teach you. We have members of the labs that have years of experience using the equipment, they are invaluable sources of information.

STAFF

I, of course, am here to help you on your career development, however, other staff members are also knowledgable about many things. Sit and have a conversation with your favorite staff member from the financial aid, admissions, business office, IT, or other offices. Tell them your plans and ask if they have advice or feedback. They are more than happy to encourage you to pursue activities or tell you about what interview questions they struggled with.

However, if you are seeking something a bit more formal, the Career Mentor Program is now accepting applications. This program pairs Capitol students with working professionals in their chosen industry.

  • Learn to set priorities and develop professional profile!
  • Explore career options within chosen degree focus!
  • Identify professional networking contacts!
  • Identify your strengths and areas of improvement!

If you are interested in applying, applications are due at 11:59pm on April 16th. To apply, please fill out and submit the “Mentee” application found here: https://mycapitol.captechu.edu/ICS/College_Offices/Career_Services/Career_Mentor_Program_Application.jnz

Read past editions of Trainer's Tips:

Etiquette

Watch Your Back

Interview Tips for Students

Make the Most of Your Summer

Career Fair Game Plan

Career Fair

Getting to Know Your Resources

 

 


 

Blog

Posted by raherschbach on 5 Apr 2018

The annual Military-Friendly Schools list is out, and Capitol Technology University is again on the list.

Victory Media, publisher of the list, announced its results for the 2018-19 school year on Wednesday (April 4). It found that Capitol exceeds military-friendly benchmarks -- in some cases, by margins as high as 75% -- for academic polices and compliance, admissions and orientation, culture and commitment, financial aid and assistance, graduation and career prospects, and military support and retention.

Now in its 17th year, the Military-Friendly Schools list aims to identify the best higher education opportunities for veterans and their spouses. It "provides a comprehensive guide for veterans and their families using data suorces from federal agencies, veteran students, and proprietary survey information from participating organizations," Victory Media said in a press release.

Stock image of a soldier wearing a graduation capDr. Bradford L. Sims, president of Capitol Technology University, said providing quality educational opportunities for the nation's servicemen and women is a high priority for the school.

“The men and women who safeguard our freedoms deserve to have the best possible avenues available for them as they transition into civilian life," Dr. Sims said. "We provide academic programs that enable them to build on the skills they have gained during their time of service, and we make these programs available and affordable through the resources that we offer."

Those resources include a tuition discount for active duty service members and their spouses -- $250 per credit for those pursuing undergraduate degree programs, and $350 for master’s degree students.

Capitol is a member of the Yellow Ribbon Program, which enables qualified veterans to study at private universities for little or no cost. Students eligible for the program can attend one of Capitol’s bachelor’s, master’s or doctoral degree programs tuition free.

Other benefits offered include a 50%  tuition discount for Maryland National Guard members for up to 12 credit hours per year, as well as tuition reimbursement support for online programs under the DANTES program.

Capitol prides itself on being a sound higher education option for soldiers and veterans because of its programs in high-demand fields as a STEM focused university, Sims noted.

Capitol prides itself on being a sound higher education option for soldiers and veterans because of its programs in high-demand fields such as cybersecurity, Sims noted.

“The US Army and other personnel branches are prioritizing cyber operations, which means that many soldiers are gaining experience in this arena,” he said. “Capitol can then help them develop their skills further through our master’s and doctoral degree programs.”

Interested in learning more about Capitol Technology University, its programs, and  the resources available to active duty personnel and veterans? Contact Jamie L. Haines, assistant director of military and graduate recruitment, at 301-369-2305 or by email at jlhaines@captechu.edu.

 

Blog

Posted by raherschbach on 4 Apr 2018

If you’re an avid gamer, you’ve probably heard the lecture before: What are you doing with your life? You're wasting your time playing computer games when you could be studying or making career plans.

Capitol students gaming during CapithonFor those planning a career in cybersecurity, though, a new report from McAfee has encouraging news: as the cybersecurity field grapples with escalating threats and shortages of qualified personnel, a gaming background is widely seen as an asset.

 McAfee surveyed 300 senior security managers and 650 security professionals in the United States and six other countries, with the aim of tapping their views on security challenges and how best to meet them.

The respondents were practically unanimous (92%) in their view that “gaming affords players experience and skills critical to cybersecurity threat hunting: logic, perseverance, an understanding of how to approach adversaries and a fresh outlook compared to traditional cybersecurity hires,” McAfee said.

In addition, 78% said those who have grown up playing video games are stronger candidates for cybersecurity roles, compared to traditional hires.

“Gamers, those engaged and immersed in online competitions, may be the logical next step to plugging the [cybersecurity skills] gap,” the report concluded.

While the report provides useful hard numbers, the findings won’t come as a surprise to cybersecurity educators. Schools with strong cybersecurity programs, such as Capitol Technology University, have long incorporated gaming techniques into their curriculum.

Indeed, a game-based approach is central to Capitol’s popular Cyber Saturdays program, designed to help attract high school and community college students to the cybersecurity field and help build a pipeline of talent.

Held several times a year, these Saturday events offer participants an opportunity to learn cybersecurity fundamentals in a fast-paced game environment. The events teach real skills but are also designed to be fun. Activities typically include challenges such as Cyber Laser Tag, Cyber Treasure Hunt, Virtual Lock Picking, and Capture the Flag.

“These events increase awareness and then they get students interested in the [cybersecurity] profession,” says Dr. William Butler, chair of the Cybersecurity program at Capitol.

 So go ahead and sharpen those gaming skills – they may be helping your career in the long run! If you’re in high school or community college, check out one of our upcoming Cyber Saturday events, including our unique Brain-Machine Interface workshop. For more information, contact the cybersecurity program at cybersat@captechu.edu.

We’ll see you in the biome!

Pages