Home | Related Research | Non-CS courses with Information Assurance Components | Related links | Student Resources | Related News | Outreach Resources | Institutional Security Resources and Awareness | UTEP Cybersecurity Community of Practice |

    Student Resources

    Funding Opportunities


    • Scholarship for Service
      The UTEP CyberCorps® Scholarship for Service (SFS) program provides scholarships to support graduate students in the Master’s of Science in Software Engineering (MSSwE) and the Ph.D. in CS programs. Undergraduates enrolled in the Fast-Track Dual Credit program may also qualify to receive an SFS Scholarship.
      Learn more

    • S-STEM
      The S-STEM scholarship program provides financial support to Computer Science students with high academic potential. In addition to the financial support, the program engages students in co-curricular activities focused on cyber-security and professional development that prepares participants for future careers.
      Application Now Open!
      Learn more


    Student Organizations


    Miners Cyber Security Club & Women in Cyber Security
    Encourage cyber security awareness & application by providing students with the tools and education they need to advance their careers. Organize events and different activities to enlarge the UTEP community.
    Join Now



    Workshops

    Attend upcoming workshops to learn tools, approaches, methods, and get hands-on experience to real-life cybersecurity scenarios.


    • Linux Fundamentals
      A presentation on the fundamentals from a beginner's perspective. Introduction to setting up a virtual Linux environment and learning bash shell commands.

    • Introduction to the CyberStart Game Series
      A presentation of the cyberstart game, a gamified learning platform to learn about cryptography, web exploitation, social engineering, steganography, Xss, SQL injection, python, and much more.

    • Cryptography
      Learn foundational knowledge of cryptography, tools, and webpages as part of the CyberStart Game series.

    • Steganography
      Learn foundational knowledge on binary, steganography, tools, and resources as part of the CyberStart Game series.

    • Forensics Part I
      Learn foundational knowledge on forensics, tools, and resources as part of the CyberStart Game series.

    • Forensics Part II
      Learn foundational knowledge on forensics, tips to find flags in Forensic themed CTFs, and resources as part of the CyberStart Game series.

    • Web Exploitation
      Learn foundational knowledge on web exploitation, tools, and resources as part of the CyberStart Game series.



    • Intro to Java Reverse Engineering
      Reverse engineering workshop to practice and learn the importance of reverse engineering in Cybersecurity.

    • Talk with Guest Speaker: Michelle Heckman
      Learn about what it is like working for the National Security Agency (NSA) and as a Federal Contractor from our gest speaker Michelle Heckman.

    • Intro to Reverse Engineering Python Malware
      Learn about what it is like working for the National Security Agency (NSA) and as a Federal Contractor from our gest speaker Michelle Heckman.

    • Hands-on Cyber Innovation Exercise: Network Cryptography
      Cryptography is the practice of techniques for secure communication in the presence of third parties. Encryption is the process of hiding or transforming data into a secretive data - only the party that knows the key can restore the original message. Third parties, possibly attackers, will not be able to view this information... unless... (find out yourself) You will engage in an interactive exercise during which an admin is accidentally sending keys to another machine on the network. Your task uncover evidence (keys and decrypted messages) that this is occurring and then mitigate the problem.



    • Reverse Software Engineering Workshop
      A First Look at Software Reverse Engineering Reverse engineering is a critical skill that is required for evaluating system security and identifying malicious behavior. Participants will be introduced to well-known reverse engineering tools and will complete exercises on sample binaries. This brief introduction is aimed at encouraging participants to grow interest in security and engage in challenges such as the NSA Code Breaker.

    • Hands-On Cybersecurity: Exploitation and Pivoting
      Through a practical exercise on a simulated network, participants will learn about the tools and methodologies that attackers use to pivot through networks and some defenses that can be used for protection and detection.

    • A First Look at Software Reverse Engineering
      Participants will be introduced to well-known reverse engineering tools and will complete exercises on sample binaries. This brief introduction is aimed at encouraging participants to grow interest in security and engage in challenges such as the NSA Code Breaker.



    Competitions


    Conferences