Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Education

New funding will help University of Arizona grow the cybersecurity workforce

  • Kyle Mittan
  • April 4, 2022
Courtesy: Applied Control Engineering Inc.
Courtesy: Applied Control Engineering Inc.
Total
0
Shares
0
0
0
0

Daily life is happening increasingly online. There isn’t a big enough cybersecurity workforce in the U.S. to keep everyone safe. That’s the problem that nearly $6 million in new funding will help the University of Arizona’s nationally renowned cyber operations program address in the coming years.

The UArizona College of Applied Science and Technology, where the program is based, received the funding in the fall from Arizona’s Technology and Research Initiative Fund. The voter-supported fund helps the state’s three public universities address issues critical to the state or larger society, including workforce development. “In a world held together by information delivered over the internet, cyber operations or cybersecurity professionals are charged with protecting their employers’ online networks,” said Jason Denno, director of cyber, intelligence and information operations at the College of Applied Science and Technology.

Students in the college’s cyber operations program learn to do that from both an offensive and defensive position. In addition to learning how to defend against cybersecurity adversaries known as “bad actors,” students also learn to act like the bad actors to better understand – and defend against – attacks.

But the outlook for the nation’s cybersecurity workforce shows a significant gap between how many jobs need filling and the number of people qualified for them. From 2019 to 2020, the number of unfilled cybersecurity jobs increased from more than 350,000 to more than 521,000. Current estimates place the gap at more than 600,000 unfilled jobs.

To fix that, the college aims to drastically increase the number of students its cyber operations program can accommodate, thus increasing the cybersecurity workforce.

“We’re trying to make a fundamental impact on the security posture of the U.S. – that’s what our graduates are going to do,” Denno said.

The cyber operations program, which features both online components and in-person opportunities at the college’s campus in Sierra Vista, began in 2016 with three students. At the beginning of this semester, the program had about 900 students. About 250 people have graduated from the program since 2016.

The new funding will allow the program to hire more faculty and staff, with the goal of boosting its enrollment to 2,000 students by the end of 2025, and to 5,000 students by the end of 2030. It will also provide for information technology (IT) infrastructure upgrades.

“The COVID-19 pandemic has only underscored our reliance on the internet, and therefore our reliance on cyber operations professionals,” said University of Arizona President Robert C. Robbins. “I am proud that our nationally recognized cyber operations program is equipped to help solve the shortage of these professionals, and I am thankful the state is partnering with us in that effort through this funding.”

Reverse engineered to be among the best

With the new funding, the college hopes to build on the successes its cyber operations program has already seen in the short time since it began. In 2018, less than two years after the program launched, it was designated a Center of Academic Excellence in Cyber Operations by the National Security Agency. Only 24 institutions nationwide have that designation.

The reasons for that recognition go back to the founding of the program.

“We reverse engineered the cyber degree from the NSA’s most technical standards,” Denno said. “We created this program from the ground up to be the most technical set of knowledge, skills and abilities for our students.”

To that end, the college has built a suite of tools and programs that deliver real-world lessons to cyber operations students.

Those programs include CyberApolis, a virtual online world with more than 15,000 online personas that use artificial intelligence (AI) to write emails, post to social media, browse the web, buy goods in online stores and more. CyberApolis replicates the real internet, providing students with a lifelike cyber operations training environment and a safe place to run offensive cyber operations drills. Doing so on the open internet could amount to a federal crime.

“We needed this synthetic, live environment that mimicked the internet, that felt completely real as a student and that was a safe environment where they couldn’t do anything wrong that they would get in trouble for,” Denno said, adding that CyberApolis will undergo upgrades as a result of the new funding.

Denno also pointed to the college’s partnership with the city of Sierra Vista, which allows cyber operations students to behave like nefarious hackers and “attack” the city’s networks to determine vulnerabilities. The students then compile a report to show where the city can improve its cyber defenses.

“The security awareness of the city has risen dramatically,” Denno said.

University Information Technology Services at UArizona have also taken on students who want to be in the cybersecurity workforce as interns so they can get hands-on experience helping to defend the university’s networks.

“Our students’ hands-on experience is embedded in our AI-driven virtual environment, from their first class through their required capstone project,” said Gary Packard, dean of the College of Applied Science and Technology. “This ensures we meet the NSA’s highest technical standards to develop graduates with real-world cybersecurity capability on Day One for the government and corporate cybersecurity workforce.”

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Kyle Mittan

Related Topics
  • CFE Content
  • Featured
Previous Article
Courtesy: Brett Sayles
  • Threats & Vulnerabilities

Canadian cyber threat bulletin echoes CISA advisory and UK alert on Russian cyber threat

  • Eric Byres
  • April 1, 2022
Read More
Next Article
Hero and Rajapaske stand next to the microscope display showing an image of the multiplying B-cells. (Courtesy of: Silvia Cardarelli, Electrical and Computer Engineering, University of Michigan)
  • Education

Immune to hacks: Inoculating deep neural networks to thwart attacks

  • Catharine June
  • April 6, 2022
Read More
You May Also Like
Graphic of M1 Chip
Read More

Researchers discover a new hardware vulnerability in the Apple M1 chip

Read More

Webcast: Using MITRE ATT&CK for ICS to Protect Your Business

Read More

Protecting Critical Infrastructure eBook

Courtesy: Bundy Group
Read More

Cybersecurity mergers and acquisitions and capital markets update

Read More

Webcast: How to Protect Against Supply Chain Attacks

Courtesy of: Louisiana State University
Read More

Taking a ‘hands-on’ approach to smartphone identity verification

Hero and Rajapaske stand next to the microscope display showing an image of the multiplying B-cells. (Courtesy of: Silvia Cardarelli, Electrical and Computer Engineering, University of Michigan)
Read More

Immune to hacks: Inoculating deep neural networks to thwart attacks

Read More

Introduction to ICS security fundamentals

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT