-
CFIA page |
Related Research |
Non-CS courses with Information Assurance Components |
Related links |
Related News |
Outreach Resources
-
Scholarship for Service
The UTEP CyberCorps® Scholarship for Service (SFS) program provides scholarships to support graduate students in the Master’s of Science in Software Engineering (MSSwE) and the Ph.D. in CS programs. Undergraduates enrolled in the Fast-Track Dual Credit program may also qualify to receive an SFS Scholarship.
Learn more
-
S-STEM
The S-STEM scholarship program provides financial support to Computer Science students with high academic potential. In addition to the financial support, the program engages students in co-curricular activities focused on cyber-security and professional development that prepares participants for future careers.
Application Now Open!
Learn more
-
Linux Fundamentals
A presentation on the fundamentals from a beginner's perspective. Introduction to setting up a virtual Linux environment and learning bash shell commands.
-
Introduction to the CyberStart Game Series
A presentation of the cyberstart game, a gamified learning platform to learn about cryptography, web exploitation, social engineering, steganography, Xss, SQL injection, python, and much more.
-
Cryptography
Learn foundational knowledge of cryptography, tools, and webpages as part of the CyberStart Game series.
-
Steganography
Learn foundational knowledge on binary, steganography, tools, and resources as part of the CyberStart Game series.
-
Forensics Part I
Learn foundational knowledge on forensics, tools, and resources as part of the CyberStart Game series.
-
Forensics Part II
Learn foundational knowledge on forensics, tips to find flags in Forensic themed CTFs, and resources as part of the CyberStart Game series.
-
Web Exploitation
Learn foundational knowledge on web exploitation, tools, and resources as part of the CyberStart Game series.
-
Intro to Java Reverse Engineering
Reverse engineering workshop to practice and learn the importance of reverse engineering in Cybersecurity.
-
Talk with Guest Speaker: Michelle Heckman
Learn about what it is like working for the National Security Agency (NSA) and as a Federal Contractor from our gest speaker Michelle Heckman.
-
Intro to Reverse Engineering Python Malware
Learn about what it is like working for the National Security Agency (NSA) and as a Federal Contractor from our gest speaker Michelle Heckman.
-
Hands-on Cyber Innovation Exercise: Network Cryptography
Cryptography is the practice of techniques for secure communication in the presence of third parties. Encryption is the process of hiding or transforming data into a secretive data - only the party that knows the key can restore the original message. Third parties, possibly attackers, will not be able to view this information... unless... (find out yourself) You will engage in an interactive exercise during which an admin is accidentally sending keys to another machine on the network. Your task uncover evidence (keys and decrypted messages) that this is occurring and then mitigate the problem.
-
Reverse Software Engineering Workshop
A First Look at Software Reverse Engineering Reverse engineering is a critical skill that is required for evaluating system security and identifying malicious behavior. Participants will be introduced to well-known reverse engineering tools and will complete exercises on sample binaries. This brief introduction is aimed at encouraging participants to grow interest in security and engage in challenges such as the NSA Code Breaker.
-
Hands-On Cybersecurity: Exploitation and Pivoting
Through a practical exercise on a simulated network, participants will learn about the tools and methodologies that attackers use to pivot through networks and some defenses that can be used for protection and detection.
-
A First Look at Software Reverse Engineering
Participants will be introduced to well-known reverse engineering tools and will complete exercises on sample binaries. This brief introduction is aimed at encouraging participants to grow interest in security and engage in challenges such as the NSA Code Breaker.
-
A24 Hour 24 Hour Software Reverse Engineering Hackathon
Presented by ARL, NSA, and UTEP CS
-
ARL-South Cybersecurity Capture the Flag
-
ARL South Cybersecurity RIG Malware Hackathon
Learn the inner workings of a critical and devastating malware that is still in use today! Make your mark - help to develop novel solutions to stop this and similar malware.
-
Cybersecurity Mini-Hackathon
Collect points by using strategies to pivot through a network Discover the mystery behind your memory blackout.
Student Resources
Funding Opportunities
Student Organizations

Miners Cyber Security Club & Women in Cyber SecurityEncourage cyber security awareness & application by providing students with the tools and education they need to advance their careers. Organize events and different activities to enlarge the UTEP community.
Join Now
Workshops
Attend upcoming workshops to learn tools, approaches, methods, and get hands-on experience to real-life cybersecurity scenarios.