AZSecure Resources

AZSecure Resources


Students and faculty mentors have suggested the following resources that have been found relevant and useful to AZSecure Cybersecurity students. 

AZSecure Cybersecurity students are expected to deposit research data that is relevant to Intelligence Security Informatics and appropriate to share in the AZSecure-data repository to make the data accessible to other researchers in accordance with current standards in research integrity, reproducibility and replicability. is an NSF funded Digital Infrastructure Building Blocks project (NSF #ACI-1443019) begun in 2014.

Other data resources relevant to cybersecurity are the Hacker Assets Portal (in production) and (Center for Applied Internet Data Analysis).

The University of Arizona's CyberCats club promotes the learning of information security through discussions and hands on activities. Open to any student who has an interest in cybersecurity. 

 (ISC)2 Tucson Chapter - The focus of the Tucson chapter of the International Information System Security Certification Consortium is to create an environment that enables Information Security professionals to grow both personally and professionally through collaboration, education and volunteer efforts aimed at increasing information security awareness within our community

CCDC competitions ask student teams to assume administrative and protective duties for an existing “commercial” network – typically a small company with 50+ users, 7 to 10 servers, and common Internet services such as a web server, mail server and e-commerce site. Each team begins the competition with an identical set of hardware and software and is scored on their ability to detect and respond to outside threats, maintain availability of existing services such as mail servers and web servers, respond to business requests such as the addition or removal of additional services and balance security needs against business needs. Throughout the competition an automated scoring engine is used to verify the functionality and availability of each team’s services on a periodic basis and traffic generators continuously feed simulated user traffic into the competition network. A volunteer red team provides the “external threat” all Internet-based services face and allows the teams to match their defensive skills against live opponents." From, retrieved June 2017.

Many Collegiate Cyber Defense Competitions are held throughout the United States:

See important dates for conference dates.

IEEE ISI: "Intelligence and Security Informatics (ISI) is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics and social and behavior studies; local, state and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. ISI supports counterterrorism and homeland security’s missions of anticipation, prevention, preparedness and response to security events, in physical, cyber, enterprise and societal spaces."

HICSS Cyber: A symposium focused on Cybersecurity and Big Data Analytics, offered as part of the Hawaii International Conference on Systems Sciences (HICSS).

DEF CON: One of the world's largest hacker conventions, held in Las Vegas, Nevada. The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as social events and contests.

BlackHat:  An information security event, presenting the latest in research, development and trends.

CactusCon: Arizona's Largest annual hacker and security conference.

Women in CyberSecurity (WiCyS): Organized by Tennesee Tech, WiCyS is held annually to address the need for mentoring and retention of women in the cybersecurity field specifically and the shortage of skilled professionals generally.

International Conference on Information Systems (ICIS): International conference of the Association for Information Systems (AIS) which serves society through the advancement of knowledge and the promotion of excellence in the practice and study of information systems.

Americas Conference on Information Systems (AMCIS): Domestic conference of the Association for Information Systems (AIS) which serves society through the advancement of knowledge and the promotion of excellence in the practice and study of information systems.

MIS Quarterly (MISQ): "The editorial objective of the MIS Quarterly is the enhancement and communication of knowledge concerning the development of IT-based services, the management of IT resources, and the use, impact and economics of IT with managerial, organizational and societal implications. Professional issues affecting the IS field as a whole are also in the purview of the journal."

Journal of Management Information Systems (JMIS): "The journal is a widely recognized forum for the presentation of research that advances the practice and understanding of organizational information systems. It serves those investigating new modes of information delivery and the changing landscape of information policy making, as well as practitioners and executives managing the information resource. A vital aim of the quarterly is to bridge the gap between theory and practice of management information systems."

ACM Transactions on Management Information Systems (TMIS): "A scholarly journal, issued quarterly, that publishes the highest quality papers about the design, development, assessment and management of information technology and systems within organizations, businesses and societies."

Communication of the ACM (CACM): "The leading print and online publication for the computing and information technology fields. Read by computing's leading professionals worldwide, Communications is recognized as the most trusted and knowledgeable source of industry information for today’s computing professional."

ACM Transactions on Information Systems (TOIS): "a scholarly journal that publishes previously unpublished high-quality scholarly articles in all areas of information retrieval.  TOIS is published quarterly."

IEEE Intelligent Systems (IEEE IS): "A bimonthly publication of the IEEE Computer Society that provides peer-reviewed, cutting-edge articles on the theory and applications of systems that perceive, reason, learn and act intelligently."

Journal of the Association for Information Science and Technology (JAIST): "publishes original research that focuses on the production, discovery, recording, storage, representation, retrieval, presentation, manipulation, dissemination, use and evaluation of information and on the tools and techniques associated with these processes."

Hack Arizona: Hosted at the University of Arizona, participants build software and hardware projects from start to finish in under 36 hours. Team or individual.

AZCWR (Arizona Cyber Warfare Range): Located in Mesa, Arizona, AZCWR is a physical and virtual place for people who wish to learn any and all aspects of cyber security. Beginners guide / server is useful for anyone who wants to learn basic web pentesting. Check their calendar for special events and appearances.

Other Arizona Events List: maintains a list of events and conferences in cybersecurity by state.

Past AZSecure Cybersecurity Fellowship students have recommended obtaining the following professional certifications:

Netsec subreddit: Focused on cyber security topics. Top voted links found by AZSecure Cybersecurity students to contain valuable content.

LinkedIn: Intelligence and Security Informatics group. 

Twitter: Intelligence and Security Informatics.

Cyber Security Degrees: This resource maintained by Degree Prospects provides job descriptions and career path information for students interested in the field of cybersecurity. a list of some tools being used for cybersecurity including threat intelligence, packet capturing, as well as links to other related lists.

Open Security Training: Free cyber security classes.

CTFTime: Lists all capture the flag events available. Students can compete as individuals, club or school.