• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

National Center of Academic Excellence in Cybersecurity

Temple University NCAE-C

  • Home
  • Programs of study
    • Graduate Programs
      • IT Auditing and Cybersecurity (NSA Validated)
        • Master of Science
        • Graduate Certificate
        • Point of Contact
        • Video
      • Cyber Defense and Information Assurance
        • Professional Science Master’s
        • Graduate Certificate
        • Point of Contact
        • Video
    • Undergraduate Programs
      • Computer Security and Digital Forensics Certificate
      • Cybersecurity and Human Behavior Certificate
  • Program Faculties
    • ITACS Faculty
    • CyberDIA Faculty
  • Industry Advisors
    • ITACS Advisory Council
      • Industry Advisors
      • Mentor Program
    • CyberDIA Advisory Board
  • Events
    • Webinars/Workshops
    • Competitions
    • Community
  • EMPLOYMENT
    • Current Jobs
    • Past Jobs
    • Career Resources
  • Resources
    • CAE Community
    • CARE LAB
      • Social Engineering Resources
      • Critical Infrastructure Ransomware Attacks
      • CARE Lab Director
    • Professional Communities
    • Training
    • October Awareness Month
    • Temple University Trainings

ITACS’ student finalists at National Cyber Analyst Challenge

NCAC_ITACS2016
ITACS’ NCAC Finalist Student Team

ITACS’ student team advanced to the final round of the National Cyber Analyst Challenge, sponsored by Leidos and the Institute for Business and Information Technology at Temple University.  In the first round, the ITACS team took the highest-level GOLD award, making it to the finals in Reston Virginia where they competed against teams from ten other colleges and universities for the grand prize.   Led by Wade Mackey our ITACS team included: Darin Bartholomew, Andres Galarza, Jason Lindsley, Josh Zenker, and Roberto Nogueda.

As the field of cyber-security greets new threats and regulations every single day, Temple’s ITACS program is dedicated to staying ahead of the curve. In pursuit of this goal, the program has created a brand new Cyber Security Track, now offered to ITACS’ ever-growing student body (whose numbers soared from 11 students in 2012 to approximately 95 this year).

ITACS is proud to offer two new special topics courses for the Cyber Security Track Spring Semester: The new courses Operating Systems Security  and Forensics complement the ITACS programs other cutting-edge courses:

  • Intrusion Detection & Response – Students learn the variety of tool and techniques used to prevent attacks, quickly identify successful attacks, detect advanced persistent threats and monitor systems activity.
  • Securing the Digital Infrastructure – Examines issues related to securing the components of a company’s infrastructure, reviewing network, firewall, and basic operating system security issues.
  • Ethical Hacking – Introduces students to hacking strategies and tactics used by ethical or “White Hat” hackers. A theoretical and exercise-based exploration of Security Penetration through vulnerability exploitation.
  • Advanced Penetration Testing – Introduces students to penetration testing, methods of vulnerability assessment and exploitation are examined as a means of identifying areas requiring improved security and recommended changes.
  • Cyber Security Capstone – Reviews all topics covered in the track; prepares for CISSP exam; requires students to research an emerging topic in the field of IT assurance.

ITACS continues to post impressive achievement numbers, as 80% of ITACS students passed the CISA on their first try, and 94% secured jobs after graduation—figures that reflect not just the quality of the training but also mounting demand for professionals armed with ITACS skills.

Share:

  • Email
  • Print
  • Tweet

Primary Sidebar

EVENTS

EventsCheck Here For More

CYBERSECURITY CAREER PATHWAYS

Cybersecurity Career Pathways ToolAccess Career Pathways Tool

SECURITY CONSULTING & EDUCATION

Cybersecurity Career Pathways ToolCybersecurity Resources

Copyright © 2025 Department of Management Information Systems · Fox School of Business · Temple University