The National Cyber League’s
registration closes 9/20!
ACT NOW. Registration Cost is $20.

Prepare yourself with the life skills you need to be successful in a
career in cybersecurity!

Competition puzzles are aligned with EC-Council’s Certified Ethical
Hacker and CompTIA’s Security+ certification exams

Upon Completion, You will recieve a Scouting Report that allows
you to validate your skills in 7 competency areas:

1. Open Source Intelligence
2. Network Traffic Analysis
3. Scanning and Reconnaissance
4. Wireless Access Exploitation
5. Password Cracking
6. Web Application Exploitation
7. Enumeration and Exploitation

2014 NCL Fall Season Schedule 

Key Semester Dates

October 29: OKTOBERFEST 5-9 PM

November 27-28: Staff/Student Holiday

December 12: End of Semester

December 15: TSTC Semester Break

January 9: Spring Registration Ends

January 12: First Day of Class for Spring Session

Club Meetings

Every Wednesday
Room 106


Contact any Club Officer for More Information or
Send an email to

Graduation Application Deadline  is  Monday, October 06, 2014

  • Log in to Web Advisor to submit application for 14/FA Graduation

  • Meet with Advisor for Signature on degree plan

  • Complete Graduate Exit Survey

  •  Order cap & gown from the bookstore: 364-4441

  • Meet with Career Services: 364-4131

  • Clear all holds - fines, parking tickets, etc.

Student Leadership Conference

September 27, 2014
University Center

7:15AM - Breakfast & Registration
8AM - Keynote Speaker: Dave Kelly
9AM - 12:30PM - Breakout Sessions
12:30PM - 1:30PM - Keynote & Lunch

Register HERE Now!



Links of Interest: The Windows Club - Check out the Windows News and the downloads section for cool tools and utilities









George Young Engineering Technology Bldg dot 1902 North Loop 499 Harlingen, TX 78550 dot Voice: 956.364.4635 dot Fax: 956.364.5164

Information technology is a thriving industry with many career paths and growing employment opportunities. Computer networks are an integral part of all organizations. The demand for workers with skills to implement, support, and secure these Networks will increase as organizations continue to invest in new technologies, and cyber attacks become more sophisticated. Working in this field requires an individual who is comfortable at multi-tasking and possesses a lot of self-discipline. If you are a good problem solver, organized, and an effective communicator, this may be the career for you.