Discover The CTU Experience

CTU Blog

Archives

Content Type

Content Category

 

Latest Posts

Trojan Horse, Zombies and 15 Critical Cybersecurity Terms You Need to Know

These days, everyone is vulnerable to cybercrime and other breaches to the security of their digital systems and identity. Our world is increasingly connected through computers, smart phones and tablets and an exploding number of apps. This influx of technology makes for that many more digital portals to protect.

Security Challenges in East Africa: Global Jihadist Groups

The East African region, and neighboring Yemen – located just across the Bab al Mandab straight – have been a central area of activity for al Qaeda, its affiliates and fellow travelers. Prior to 9/11, al Qaeda carried out its first major attack against the United States in the region when, in August of 1998, al Qaeda suicide bombers attacked the U.S. embassies in Nairobi, Kenya and Dar es Salaam, Tanzania.

What Is Cyber?

Cyber is in. Government officials share worries over cybersecurity. The Intelligence Community warns of cyber threats from nation states, anarchist groups and lone wolves. Civil liberties watch groups decry infringements of privacy and individual rights by state-sponsored cyber eavesdropping.

Security Challenges in East Africa: U.S. Army Tabletop Exercise in Tanzania

In addition to east Africa being a geographic region, it is also a political and social one in which many of the countries share a common national language, Swahili.

Security Risks Surrounding Near Field Communication

Another technology is making inroads into our professional lives, while experts begin to weigh its benefits against the security risks.

Copyright © 2016 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below.

Privacy Statement Legal Terms and Conditions Student Disclosures Sitemap Student Safety Contact Us


 (855) 230-0555

Terms and Conditions By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider.  You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech. While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply).  Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts.  Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×