Detecting Contaminants in Drinking Water and Source Water During a Hazardous Spill

September 8, 2022
The following is a guest blog by Capitol Tech doctoral graduate Jegnaw G Essatu, who breaks down the Jackson Water Crisis from a Critical Infrastructure point of view and discusses the methods in which contaminants are detected
Read More

ALPHA: From Breaking Ground to Breaking Records



This year is certainly turning out to be an exciting one for the space industry.

Read More

Recover from the Summer Slump with these unique tips

September 6, 2022
Summer’s over! At least your summer has concluded. Officially the season does not end until September 22, but once you are back in school or college, it’s game over. Back to the routine for you! The more quickly you can segue back into the daily grind, the easier you will find adjustment. Consider these tips for an easier transition:
Read More

Dr. Ward and Dr. Butler: From Battlefields to Cyberspace



As part of our fundraising campaign for the David Ward Memorial Bench and Scholarship, Dr. William Butler, a dear friend of Dr. Ward and a prominent figure in Capitol's cyber history (who now serves as Capitol's VP of Academic Affairs), has written the following account of the wonderful years the two spent knowing each other. 

Read More

Capitol STEM Challenge

STEM Events

Online Master of Research (MRes) in Systems Engineering

Doctor of Philosophy (PhD) in Offensive Cyber Engineering

Lasers from Space Gather Climate Change Data in Forests

September 1, 2022
For several decades, global climate change has been a hot-button issue. Rising sea levels, melting ice caps, and unusual storm activity all signal that our planet is in trouble, and experts have struggled to agree on a universal answer for slowing the heat death of the world. 
Read More

The Crucial Cybersecurity Needs of Healthcare Technology

August 25, 2022
Cybersecurity in the health industry is a huge and growing field. When the Health Insurance Portability and Accountability Act of 1996 (HIPAA) passed in 1996, it ushered in an avalanche of new practices surrounding the privacy of patient health information. Medical providers and other entities were required to take whatever steps were needed to ensure that sensitive health data in electronic form was protected against security threats.
Read More