What's happening on UAT's campus- A blog published by UAT Students.

UAT Cyber Warfare Range: A Unique Learning Environment

    The UAT Cyber Warfare Range (AKA "The Cave") is the main hub for network security, network engineering and technology forensic students at the University of Advancing Technology. All of our classes take place in this room, and we also host cyber security events in this collaborative space. 

    The room itself works differently from traditional classrooms because it was designed to promote hands-on learning. Students work off an isolated network and have access to Forensics Evidence Recovery Devices (FREDs). 

    Screen Shot 2018-05-11 at 2.25.59 PM

    In entry-level classes such as Foundations of Systems Administration, students build a virtual network composed of Windows Server 2016. In another class, I got a work order and had to complete the tasks on it by the deadline, just like in the real world. I used the cluster to make a network comprised of virtual machines, which helped me complete tasks such as setting up an active directory and giving different users different permissions.

    20160918_113224

    In Computer Forensic Essentials, the professor gave us a hard drive image and tasked us with writing a case report. In order to accomplish this task, we utilized the FREDs. These devices enable students to image a flash drive or hard drive for forensics recovery software. One of the main focuses of the class is ensuring that evidence remains valid and useable in the court. The emphasis on validity is important because digital evidence can be easily tampered with.

    But we don't use preserve evidence and data, we also document everything.

    files-1614223_960_720

    In forensics, correct documentation enables the examiner to adequately describe how the evidence was handled. Documentation also helps law enforcement and lawyers effectively present the evidence.

    Many different moving pieces work together to help an enterprise network function. That's why it's so important to document what changes you make, so another person can use that document when they need to troubleshoot or use a reference. 

    cyber-security-3400657_960_720

    Outside of classes, we also host events in the UAT Cyber Warfare Range. For example, the Information Security Organization holds weekly meetings in the Range, where students showcase what they are working on or explore topics together. 

    Jackson Nestler is the club president and a UAT Cyber Warfare Range intern. “We host two primary activities outside of our typical classes in The Cave: the Collegiate Cyber Defense Competition (CCDC) meets on Tuesdays at 6:30 pm to prepare for upcoming competitions, train and discuss strategy. And on Saturdays at 6 pm, we have our Information Security Organization (ISO), which is a casual meetup for students interested in learning real-world security applications, expanding on the knowledge that they receive in classrooms and meeting like minded peers. Right now, we’re working on bringing guest speakers to ISO as well," Nestler said. 

    To learn more about The Cave or our Cyber Security program, visit our website

     

    Posted on May 23, 2018 9:21:00 AM by Jeremy Bunce in Cyber Security, in network engineering, in Network Security, in technology forensics, in Blue Team, in UAT Cyber Warfare Range, in project-based curriculum, in red team, in systems administration

    Jeremy Bunce

    Written by Jeremy Bunce

       

    Email me when there is a new post.

    I'd like more information about UAT

    Lists by Topic

    see all

    Recent Posts

    Posts by Topic

    see all